Browse all 3 CVE security advisories affecting EuroTel. AI-powered Chinese analysis, POCs, and references for each vulnerability.
EuroTel operates as a telecommunications provider offering voice, data, and internet services to residential and business customers. Historically, the organization has faced vulnerabilities across multiple classes, including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation, often stemming from misconfigured web applications and network infrastructure. Security assessments reveal inconsistent patch management and legacy system exposures. While no major public incidents have been documented, the three recorded CVEs highlight ongoing challenges in maintaining secure service delivery. The organization's security posture appears reactive rather than proactive, with vulnerabilities typically addressed only after public disclosure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-6930 | Improper Access Control in EuroTel ETL3100 — ETL3100CWE-284 | 9.4 | Critical | 2023-12-19 |
| CVE-2023-6929 | Authorization Bypass Through User-Controlled Key in EuroTel ETL3100 — ETL3100CWE-639 | 7.5 | High | 2023-12-19 |
| CVE-2023-6928 | Improper Restriction of Excessive Authentication Attempts — ETL3100CWE-307 | 9.8 | Critical | 2023-12-19 |
This page lists every published CVE security advisory associated with EuroTel. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.