Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

kekotron — Vulnerabilities & Security Advisories 4

Browse all 4 CVE security advisories affecting kekotron. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Kekotron serves as an embedded security platform primarily used for cryptographic operations and secure authentication in industrial control systems. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure default configurations. The platform has faced scrutiny for its security posture, with four CVEs documenting issues such as buffer overflows and authentication bypasses. These vulnerabilities have potentially exposed critical infrastructure to unauthorized access and control, highlighting ongoing challenges in securing embedded systems with legacy codebases and complex integration requirements.

This page lists every published CVE security advisory associated with kekotron. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.