Browse all 3 CVE security advisories affecting Uniway. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Uniway provides network and communication solutions for enterprises, focusing on unified messaging and collaboration systems. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been widely documented, the three CVEs on record highlight persistent weaknesses in authentication mechanisms and secure coding practices. These vulnerabilities could allow attackers to compromise systems, escalate privileges, or execute arbitrary code, posing significant risks to organizations relying on Uniway's infrastructure for critical communications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-7211 | Uniway Router Administrative Web Interface reliance on ip address for authentication — RouterCWE-291 | 5.6 | Medium | 2024-01-07 |
| CVE-2023-7209 | Uniway Router Device Reset device_reset.cgi denial of service — RouterCWE-404 | 7.5 | High | 2024-01-07 |
This page lists every published CVE security advisory associated with Uniway. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.