Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Planet Technology — Vulnerabilities & Security Advisories 22

Browse all 22 CVE security advisories affecting Planet Technology. AI-powered Chinese analysis, POCs, and references for each vulnerability.

PLANET Technology manufactures industrial networking hardware, primarily focusing on Ethernet switches and routers designed for harsh environments and automation systems. Security audits have identified twenty-two Common Vulnerabilities and Exposures (CVEs) associated with its product line, indicating a persistent history of software flaws. The most prevalent vulnerability classes include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation issues, often stemming from unauthenticated access points or insecure default configurations in web management interfaces. These defects frequently allow attackers to gain unauthorized control over network devices or exfiltrate sensitive data. While specific major public incidents are not widely documented in mainstream news, the cumulative CVE count suggests systemic weaknesses in firmware development and security testing processes. Organizations deploying PLANET devices should prioritize network segmentation and regular firmware updates to mitigate these known risks, as the hardware’s industrial role often makes it a critical target for lateral movement within corporate networks.

Found 12 results / 22Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-8459 PLANET Technology switch devices - Cleartext storage of SNMPv3 users' passwords — GS-4210-24PL4C hardware 2.0CWE-312 7.2 High2024-09-30
CVE-2024-8458 PLANET Technology switch devices - Cross-site Request Forgery — GS-4210-24PL4C hardware 2.0CWE-352 8.8 High2024-09-30
CVE-2024-8457 PLANET Technology switch devices - Stored cross-site scripting (XSS) in the User Management — GS-4210-24PL4C hardware 2.0CWE-79 4.8 Medium2024-09-30
CVE-2024-8456 PLANET Technology switch devices - Missing Authentication for multiple HTTP routes — GS-4210-24PL4C hardware 2.0CWE-306 9.8 Critical2024-09-30
CVE-2024-8455 PLANET Technology switch devices - Swctrl service exchanges weakly encoded passwords — GS-4210-24PL4C hardware 2.0CWE-261 8.1 High2024-09-30
CVE-2024-8454 PLANET Technology switch devices - Swctrl service DoS attack — GS-4210-24PL4C hardware 2.0CWE-476 5.3 Medium2024-09-30
CVE-2024-8453 PLANET Technology switch devices - Weak hash for users' passwords — GS-4210-24PL4C hardware 2.0CWE-328 4.9 Medium2024-09-30
CVE-2024-8452 PLANET Technology switch devices - Insecure hash functions used for SNMPv3 credentials — GS-4210-24PL4C hardware 2.0CWE-327 7.5 High2024-09-30
CVE-2024-8451 PLANET Technology switch devices - SSH server DoS attack — GS-4210-24PL4C hardware 2.0CWE-400 7.5 High2024-09-30
CVE-2024-8450 PLANET Technology switch devices - Hard-coded SNMPv1 read-write community string — GS-4210-24PL4C hardware 2.0CWE-798 8.6 High2024-09-30
CVE-2024-8449 PLANET Technology switch devices - Local users' passwords recovery through hard-coded credentials — GS-4210-24PL4C hardware 2.0CWE-798 6.8 Medium2024-09-30
CVE-2024-8448 PLANET Technology switch devices - Remote privilege escalation using hard-coded credentials — GS-4210-24PL4C hardware 2.0CWE-798 8.8 High2024-09-30

This page lists every published CVE security advisory associated with Planet Technology. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.