Browse all 5 CVE security advisories affecting Juplink. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Juplink provides cloud-based connectivity solutions for IoT devices, enabling secure remote management and data collection. Historically, the organization's products have been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by five recorded CVEs. Security assessments have frequently identified authentication bypass weaknesses and insecure API endpoints as recurring concerns. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities in authentication and remote access components suggests potential exposure risks for enterprise deployments relying on their platform.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-41031 | Juplink RX4-1500 homemng.htm Command Injection Vulnerability — RX4-1500CWE-77 | 8.0 | High | 2023-09-22 |
| CVE-2023-41029 | Juplink RX4-1500 Command Injection Vulnerability — RX4-1500CWE-77 | 8.0 | High | 2023-09-22 |
| CVE-2023-41027 | Juplink RX4-1500 Credential Disclosure Vulnerability — RX4-1500CWE-210 | 8.0 | High | 2023-09-22 |
| CVE-2023-41030 | Juplink RX4-1500 Hard-coded Credential Vulnerability — RX4-1500CWE-259 | 6.3 | Medium | 2023-09-18 |
| CVE-2023-41028 | Juplink RX4-1500 Stack-based Buffer Overflow Vulnerability — RX4-1500CWE-121 | 9.0 | Critical | 2023-08-23 |
This page lists every published CVE security advisory associated with Juplink. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.