Browse all 5 CVE security advisories affecting Cellopoint. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Cellopoint provides web security and content filtering solutions, primarily serving organizations requiring internet access control and threat protection. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, as evidenced by five recorded CVEs. These issues often stem from improper input validation and insufficient access controls in web management interfaces. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities in their web components suggests potential risks for unpatched deployments, emphasizing the need for timely updates and hardening of administrative interfaces.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-17385 | Cellopoint CelloOS - Unauthenticated Arbitrary File Disclosure — CelloOS | 7.5 | High | 2020-08-25 |
| CVE-2020-17386 | Cellopoint CelloOS - Server-Side Request Forgery (SSRF) — CelloOSCWE-918 | 6.5 | Medium | 2020-08-25 |
| CVE-2020-17384 | Cellopoint CelloOS - Remote Command Execution (RCE) — CelloOS | 7.2 | High | 2020-08-25 |
This page lists every published CVE security advisory associated with Cellopoint. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.