Browse all 4 CVE security advisories affecting EIPStackGroup. AI-powered Chinese analysis, POCs, and references for each vulnerability.
EIPStackGroup develops enterprise integration platforms facilitating seamless communication between diverse software systems. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. While no major public security incidents have been widely documented, the four CVEs on record highlight persistent weaknesses in authentication mechanisms and API security. Their architecture typically involves multiple interconnected components, increasing attack surface complexity. Organizations implementing EIPStackGroup solutions should prioritize regular patching and harden configurations against common exploitation patterns observed in similar middleware technologies.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-27500 | EIPStackGroup OpENer Ethernet/IP Reachable Assertion — OpENer EtherNet/IPCWE-617 | 7.5 | High | 2022-05-12 |
| CVE-2021-27498 | EIPStackGroup OpENer Ethernet/IP Reachable Assertion — OpENer EtherNet/IPCWE-617 | 7.5 | High | 2022-05-12 |
| CVE-2021-27482 | EIPStackGroup OpENer Ethernet/IP Out-of-bounds Read — OpENer EtherNet/IPCWE-125 | 7.5 | High | 2022-05-12 |
| CVE-2021-27478 | EIPStackGroup OpENer Ethernet/IP Incorrect Conversion between Numeric Types — OpENer EtherNet/IPCWE-681 | 8.2 | High | 2022-05-12 |
This page lists every published CVE security advisory associated with EIPStackGroup. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.