Browse all 6 CVE security advisories affecting Raisecom. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Raisecom develops networking equipment for telecommunications and enterprise environments, focusing on broadband access and data communication solutions. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from improper input validation and weak authentication mechanisms. The company's devices have faced multiple security incidents, including several critical vulnerabilities that allow unauthorized access and system compromise. With six CVEs currently on record, Raisecom's products have demonstrated consistent security weaknesses, particularly in web interfaces and firmware implementations, making them targets for attackers seeking network infiltration and lateral movement opportunities.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-1536 | Raisecom Multi-Service Intelligent Gateway Request Parameter vpn_template_style.php os command injection — Multi-Service Intelligent GatewayCWE-78 | 7.3 | High | 2025-02-21 |
This page lists every published CVE security advisory associated with Raisecom. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.