Browse all 4 CVE security advisories affecting MegaTec Taiwan. AI-powered Chinese analysis, POCs, and references for each vulnerability.
MegaTec Taiwan specializes in industrial automation and control systems, serving critical infrastructure sectors. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and insecure default configurations. While no major public security incidents have been widely reported, the company's products have accumulated four CVEs, highlighting persistent security challenges in their firmware and web interfaces. These vulnerabilities pose risks to operational technology environments, potentially allowing unauthorized access or system compromise. Security researchers have noted that patch adoption remains inconsistent across their installed base, leaving many deployments exposed to known exploits.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-66269 | Unquoted Service Path in UPSilon2000V6.0(RupsMon and USBMate) running as SYSTEM — UPSilon2000V6.0CWE-428 | 7.8AI | HighAI | 2025-11-26 |
| CVE-2025-66266 | Insecure SYSTEM Service Permissions in UPSilon2000V6.0 (RupsMon.exe) leading to trivial Local Privilege Escalation — UPSilon2000V6.0CWE-269 | 7.8AI | HighAI | 2025-11-26 |
| CVE-2025-66265 | Insecure permissions in configuration directory (C:\\usr) — ClientMateCWE-269 | 7.8AI | HighAI | 2025-11-26 |
| CVE-2025-66264 | Unquoted Service path in UPSilon2000V6.0 SYSTEM privilege service — ClientMateCWE-428 | 7.8AI | HighAI | 2025-11-26 |
This page lists every published CVE security advisory associated with MegaTec Taiwan. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.