Browse all 5 CVE security advisories affecting troglobit. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Troglobit is primarily known for its work on process management and system monitoring tools, particularly in embedded Linux environments. Historically, its software has been susceptible to remote code execution and privilege escalation vulnerabilities, often stemming from improper input validation and insecure service configurations. While no major public security incidents have been widely documented, the five CVEs associated with troglobit reveal consistent patterns of boundary condition errors and insufficient access controls in its process management utilities. These vulnerabilities typically allow attackers to manipulate system services or gain elevated privileges through crafted input or service interaction flaws.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2020-37182 | Redir 3.3 - Denial of Service — RedirCWE-121 | 7.5 | High | 2026-02-11 |
| CVE-2025-32022 | Finit has heap based buffer overwrite in urandom.so plugin — finitCWE-787 | 4.6 | Medium | 2025-05-06 |
| CVE-2025-29906 | Finit bundled getty can bypass /bin/login — finitCWE-287 | 8.6 | High | 2025-04-29 |
| CVE-2020-5221 | Directory Traversal (Chroot Escape) vulnerability in uftpd — uftpdCWE-22 | 6.5 | Medium | 2020-01-22 |
| CVE-2020-5204 | Buffer overflow vulnerability in uftpd — uftpdCWE-121 | 6.5 | Medium | 2020-01-06 |
This page lists every published CVE security advisory associated with troglobit. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.