Browse all 4 CVE security advisories affecting SATO. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SATO specializes in providing barcode labeling and RFID solutions for supply chain and inventory management. Historically, vulnerabilities in SATO products have included remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and authentication flaws. The company has addressed multiple CVEs, with some instances allowing unauthorized access or system compromise. SATO's security posture has shown improvement through regular patch releases, though legacy systems may remain vulnerable. No major public security incidents have been widely reported, but the presence of multiple CVEs indicates ongoing security challenges in their embedded systems and web interfaces.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-11155 | WEAK ENCODING FOR PASSWORD IN DEVICE SERVER CONFIGURATION — S86-ex 203dpiCWE-261 | 7.5AI | HighAI | 2025-09-29 |
| CVE-2023-5328 | SATO CL4NX-J Plus Cookie improper authentication — CL4NX-J PlusCWE-287 | 6.3 | Medium | 2023-10-01 |
| CVE-2023-5327 | SATO CL4NX-J Plus path traversal — CL4NX-J PlusCWE-22 | 3.5 | Low | 2023-10-01 |
| CVE-2023-5326 | SATO CL4NX-J Plus WebConfig improper authentication — CL4NX-J PlusCWE-287 | 6.3 | Medium | 2023-10-01 |
This page lists every published CVE security advisory associated with SATO. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.