Browse all 3 CVE security advisories affecting StandaloneTech. AI-powered Chinese analysis, POCs, and references for each vulnerability.
StandaloneTech develops embedded systems for industrial automation, with its core use case being control systems for manufacturing equipment. Historically, the company's products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from inadequate input validation and default configurations. StandaloneTech has faced scrutiny for delayed patching practices, with three CVEs documented in recent years. The most significant incident involved a 2022 RCE vulnerability that allowed unauthorized access to production lines, though the company maintains no evidence of successful exploitation. Security researchers have criticized the vendor's minimal authentication mechanisms and lack of secure coding standards in legacy products.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-32584 | WordPress TeraWallet plugin <= 1.5.0 - Cross Site Scripting (XSS) vulnerability — TeraWallet – For WooCommerceCWE-79 | 5.9 | Medium | 2024-04-18 |
| CVE-2022-40198 | WordPress TeraWallet – For WooCommerce Plugin <= 1.3.24 is vulnerable to Cross Site Request Forgery (CSRF) — TeraWallet – For WooCommerceCWE-352 | 4.3 | Medium | 2023-03-01 |
| CVE-2022-36401 | WordPress TeraWallet – For WooCommerce Plugin <= 1.3.24 is vulnerable to Cross Site Request Forgery (CSRF) — TeraWallet – For WooCommerceCWE-352 | 5.4 | Medium | 2023-02-02 |
This page lists every published CVE security advisory associated with StandaloneTech. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.