Browse all 6 CVE security advisories affecting elecV2. AI-powered Chinese analysis, POCs, and references for each vulnerability.
elecV2 is an embedded electronics platform primarily used for IoT device development and automation systems. Historically, it has been susceptible to multiple vulnerability classes including remote code execution, cross-site scripting, and privilege escalation, as evidenced by its six recorded CVEs. The platform's security characteristics include a focus on lightweight implementations which may introduce security trade-offs. While no major public security incidents have been widely documented, the consistent pattern of vulnerabilities across multiple CVEs suggests potential weaknesses in input validation and access control mechanisms that could expose deployed systems to unauthorized access or compromise.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-5016 | elecV2 elecV2P URL mock eAxios server-side request forgery — elecV2PCWE-918 | 7.3 | High | 2026-03-28 |
| CVE-2026-5015 | elecV2 elecV2P Endpoint logs cross site scripting — elecV2PCWE-79 | 4.3 | Medium | 2026-03-28 |
| CVE-2026-5014 | elecV2 elecV2P Wildcard log path.join path traversal — elecV2PCWE-22 | 5.3 | Medium | 2026-03-28 |
| CVE-2026-5013 | elecV2 elecV2P :key path.join path traversal — elecV2PCWE-22 | 5.3 | Medium | 2026-03-28 |
| CVE-2026-5012 | elecV2 elecV2P rpc pm2run os command injection — elecV2PCWE-78 | 7.3 | High | 2026-03-28 |
| CVE-2026-5011 | elecV2 elecV2P JSON webhook runJSFile code injection — elecV2PCWE-94 | 6.3 | Medium | 2026-03-28 |
This page lists every published CVE security advisory associated with elecV2. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.