Browse all 4 CVE security advisories affecting TMT. AI-powered Chinese analysis, POCs, and references for each vulnerability.
TMT operates as a telecommunications middleware provider enabling network infrastructure management and service delivery platforms. Historically, the organization has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation weaknesses in their web-based management interfaces. These vulnerabilities often stem from insufficient input validation and improper access controls. TMT has documented four CVEs to date, with no major public security incidents reported. The platform's exposure to remote exploitation risks remains notable due to its internet-facing management components and integration with critical network infrastructure, necessitating regular security assessments and patch management for deployed instances.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-3050 | Authentication Bypass in TMT's Lockcell — LockcellCWE-784 | 9.8 | Critical | 2023-06-13 |
| CVE-2023-3049 | File Upload in TMT's Lockcell — LockcellCWE-434 | 9.8 | Critical | 2023-06-13 |
| CVE-2023-3048 | IDOR in TMT's Lockcell — LockcellCWE-639 | 9.8 | Critical | 2023-06-13 |
| CVE-2023-3047 | SQLi in TMT's Lockcell — LockcellCWE-89 | 9.8 | Critical | 2023-06-13 |
This page lists every published CVE security advisory associated with TMT. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.