Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Sciener — Vulnerabilities & Security Advisories 8

Browse all 8 CVE security advisories affecting Sciener. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Sciener develops smart lock systems focused on remote access control and property management. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and authentication flaws. The company's products have faced multiple security incidents, including exposed API endpoints and insecure default configurations that allowed unauthorized access. Security researchers have identified weaknesses in mobile applications and web platforms, leading to potential bypasses of security controls. While no major public breaches have been widely reported, the consistent pattern of vulnerabilities suggests ongoing challenges in secure development practices for IoT access control systems.

CVE IDTitleCVSSSeverityPublished
CVE-2023-7005 CVE-2023-7005 — TTLock App 7.5 -2024-12-19
CVE-2023-6960 CVE-2023-6960 — TTLock App 4.3 -2024-03-15
CVE-2023-7003 CVE-2023-7003 — Kontrol LuxCWE-323 5.3 -2024-03-15
CVE-2023-7007 CVE-2023-7007 — Gateway G2 7.5 -2024-03-15
CVE-2023-7006 CVE-2023-7006 — Kontrol Lux 4.6 -2024-03-15
CVE-2023-7004 CVE-2023-7004 — TTLock App 7.5 -2024-03-15
CVE-2023-7009 CVE-2023-7009 — Kontrol Lux 8.1 -2024-03-15
CVE-2023-7017 CVE-2023-7017 — Kontrol Lux 8.8 -2024-03-15

This page lists every published CVE security advisory associated with Sciener. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.