Browse all 8 CVE security advisories affecting Sciener. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Sciener develops smart lock systems focused on remote access control and property management. Historically, vulnerabilities have included remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and authentication flaws. The company's products have faced multiple security incidents, including exposed API endpoints and insecure default configurations that allowed unauthorized access. Security researchers have identified weaknesses in mobile applications and web platforms, leading to potential bypasses of security controls. While no major public breaches have been widely reported, the consistent pattern of vulnerabilities suggests ongoing challenges in secure development practices for IoT access control systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-7005 | CVE-2023-7005 — TTLock App | 7.5 | - | 2024-12-19 |
| CVE-2023-6960 | CVE-2023-6960 — TTLock App | 4.3 | - | 2024-03-15 |
| CVE-2023-7003 | CVE-2023-7003 — Kontrol LuxCWE-323 | 5.3 | - | 2024-03-15 |
| CVE-2023-7007 | CVE-2023-7007 — Gateway G2 | 7.5 | - | 2024-03-15 |
| CVE-2023-7006 | CVE-2023-7006 — Kontrol Lux | 4.6 | - | 2024-03-15 |
| CVE-2023-7004 | CVE-2023-7004 — TTLock App | 7.5 | - | 2024-03-15 |
| CVE-2023-7009 | CVE-2023-7009 — Kontrol Lux | 8.1 | - | 2024-03-15 |
| CVE-2023-7017 | CVE-2023-7017 — Kontrol Lux | 8.8 | - | 2024-03-15 |
This page lists every published CVE security advisory associated with Sciener. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.