Browse all 9 CVE security advisories affecting roxy-wi. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Roxy-WI is a web interface for managing HAProxy, Nginx, and Keepalived, primarily used for load balancer configuration and monitoring. Historically, it has been vulnerable to multiple security issues including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation vulnerabilities. The application has accumulated 9 CVEs to date, with several allowing unauthenticated attackers to execute arbitrary commands or bypass security controls. Notable characteristics include its exposure of sensitive system information and insufficient input validation in multiple components. While no major public incidents have been widely documented, the consistent discovery of critical vulnerabilities in its codebase highlights ongoing security concerns for administrators deploying this tool in production environments.
This page lists every published CVE security advisory associated with roxy-wi. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.