Browse all 6 CVE security advisories affecting Frauscher. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Frauscher specializes in railway condition monitoring systems, providing trackside solutions for detecting wheel and axle defects. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and insecure default configurations. While no major public security incidents have been documented, the consistent presence of multiple CVEs across different product lines indicates potential systemic security challenges. Their systems, deployed in critical infrastructure, require robust security measures to prevent unauthorized access or manipulation, given the potential safety implications of railway security breaches.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-3705 | OS Command Injection via USB Config Load — FDS102CWE-78 | 6.8 | Medium | 2025-07-07 |
| CVE-2025-3626 | OS Command Injection via Config Upload in WebUI — FDS102CWE-78 | 9.1 | Critical | 2025-07-07 |
This page lists every published CVE security advisory associated with Frauscher. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.