VARIoT IoT vulnerabilities database
| VAR-201805-0252 | CVE-2018-10593 | DB Manager and PerformA In SQL Injection vulnerability |
CVSS V2: 3.8 CVSS V3: 5.6 Severity: MEDIUM |
A vulnerability in DB Manager version 3.0.1.0 and previous and PerformA version 3.0.0.0 and previous allows an authorized user with access to a privileged account on a BD Kiestra system (Kiestra TLA, Kiestra WCA, and InoqulA+ specimen processor) to issue SQL commands, which may result in data corruption. DB Manager and PerformA In SQL An injection vulnerability exists.Information is falsified and denial of service (DoS) May be in a state. BD DB Manager and PerformA are products of BD (Bection, Dickinson and Commpany). BD DB Manager is a database manager. PerformA is a performance manager. Security vulnerabilities exist in BD DB Manager 3.0.1.0 and earlier and PerformA 3.0.0.0 and earlier. An attacker could exploit the vulnerability to issue SQL commands, causing data corruption
| VAR-201805-1007 | CVE-2018-7942 | plural Huawei Authentication vulnerabilities in server products |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
The iBMC (Intelligent Baseboard Management Controller) of some Huawei servers have an authentication bypass vulnerability. An unauthenticated, remote attacker may send some specially crafted messages to the affected products. Due to improper authentication design, successful exploit may cause some information leak. plural Huawei Server products contain authentication vulnerabilities.Information may be obtained. Huawei1288HV5 and other Huawei server models are different types of servers. Huawei 1288H V5, etc. The following products and versions are affected: 1288H V5 V100R005C00 Version; 2288H V5 V100R005C00 Version; 2488 V5 V100R005C00 Version; CH121 V3 V100R001C00 Version; CH121L V3 V100R001C00 Version; CH121L V5 V100R001C00 Version; CH121 V5 V100R001C00 Version; CH140 V3 V100R001C00 Version; CH140L V3 V100R001C00 Version; CH220 V3 V100R001C00 Version; CH222 V3 V100R001C00 Version; CH242 V3 V100R001C00 Version; CH242 V5 V100R001C00 Version; RH1288 V3 V100R003C00 Version; RH2288 V3 V100R003C00 Version; RH2288H V3 V100R003C00 Version; XH310 V3 V100R003C00 Version; XH321 V3 V100R003C00 Version; XH321 V5 V100R005C00 Version: XH620 V3 V100R003C00 version
| VAR-201805-0837 | CVE-2018-11399 | SimpliSafe Original Vulnerable to information disclosure |
CVSS V2: 1.9 CVSS V3: 4.3 Severity: MEDIUM |
SimpliSafe Original has Unencrypted Sensor Transmissions, which allows physically proximate attackers to obtain potentially sensitive information about the specific times when alarm-system events occur. SimpliSafe Original Contains an information disclosure vulnerability.Information may be obtained. SimpliSafe Original is a home security management system. The system includes video surveillance and intrusion alarms, among other things. A security flaw exists in SimpliSafe Original, which stems from the program not encrypting the messages passed. An attacker in physical proximity could exploit this vulnerability to obtain sensitive information
| VAR-201805-0838 | CVE-2018-11400 | SimpliSafe Original Vulnerabilities related to security functions |
CVSS V2: 4.9 CVSS V3: 4.6 Severity: MEDIUM |
In SimpliSafe Original, the Base Station fails to detect tamper attempts: it does not send a notification if a physically proximate attacker removes the battery and external power. SimpliSafe Original Contains vulnerabilities related to security features.Service operation interruption (DoS) There is a possibility of being put into a state. SimpliSafe Original is a home security management system. The system includes video surveillance and intrusion alarms, among other things. There is a security flaw in SimpliSafe Original
| VAR-201805-1002 | CVE-2018-7903 | Huawei 1288H V5 and 2288H V5 Software injection command vulnerability |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
Huawei 1288H V5 and 288H V5 with software of V100R005C00 have a JSON injection vulnerability. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Due to insufficient verification of the input, this could be exploited to obtain the management privilege of the system. Huawei 1288H V5 and 2288H V5 The software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Huawei 1288HV5 and 2288HV5 are Huawei's rack server devices
| VAR-201805-0177 | CVE-2017-17315 | plural Huawei Vulnerability related to input validation in products |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Huawei DP300 V500R002C00; RP200 V600R006C00; TE30 V100R001C10; V500R002C00; V600R006C00; TE40 V500R002C00; V600R006C00; TE50 V500R002C00; V600R006C00; TE60 V100R001C10; V500R002C00; V600R006C00 have a numeric errors vulnerability. An unauthenticated, remote attacker may send specially crafted SCCP messages to the affected products. Due to the improper validation of the messages, it will cause numeric errors when handling the messages. Successful exploit will cause some services abnormal. plural Huawei The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Huawei DP300 and other products are all products of China Huawei. The DP300 is a video conferencing terminal. The RP200 is a video conferencing machine. A security vulnerability exists in several Huawei products due to insufficient verification messages from the program. The following products and versions are affected: Huawei DP300 V500R002C00 Version; RP200 V600R006C00 Version; TE30 V100R001C10 Version, V500R002C00 Version, V600R006C00 Version; TE40 V500R002C00 Version, V600R006C00 Version; TE50 V500R002C00 Version, V600R006C00 Version; TE60 V100R001C10 Version, V500R002C00 Version, V600R006C00 Version
| VAR-201805-0839 | CVE-2018-11401 | SimpliSafe Original Vulnerabilities related to security functions |
CVSS V2: 4.9 CVSS V3: 4.6 Severity: MEDIUM |
In SimpliSafe Original, RF Interference (e.g., an extremely strong 433.92 MHz signal) by a physically proximate attacker does not cause a notification. SimpliSafe Original Contains vulnerabilities related to security features.Service operation interruption (DoS) There is a possibility of being put into a state. SimpliSafe Original is a home security management system. The system includes video surveillance and intrusion alarms, among other things. There is a security flaw in SimpliSafe Original. An attacker in physical proximity could exploit this vulnerability to bypass security protections
| VAR-201805-1001 | CVE-2018-7902 | Huawei 1288H V5 and 2288H V5 Software injection command vulnerability |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
Huawei 1288H V5 and 288H V5 with software of V100R005C00 have a JSON injection vulnerability. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Due to insufficient verification of the input, this could be exploited to obtain the management privilege of the system. Huawei 1288H V5 and 2288H V5 The software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The Huawei 1288HV5 and 2288HV5 are Huawei's rack server devices
| VAR-201805-1003 | CVE-2018-7904 | Huawei 1288H V5 and 2288H V5 Software injection command vulnerability |
CVSS V2: 4.0 CVSS V3: 8.8 Severity: HIGH |
Huawei 1288H V5 and 288H V5 with software of V100R005C00 have a JSON injection vulnerability. An authenticated, remote attacker can launch a JSON injection to modify the password of administrator. Due to insufficient verification of the input, this could be exploited to obtain the management privilege of the system. Huawei 1288H V5 and 2288H V5 The software contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Huawei1288HV5 and 2288HV5 are rack routers, which can be widely used in cloud computing virtualization, database, big data and other workloads. The vulnerability stems from a program that fails to adequately verify input
| VAR-201805-0840 | CVE-2018-11402 | SimpliSafe Original Vulnerable to information disclosure |
CVSS V2: 1.9 CVSS V3: 6.6 Severity: MEDIUM |
SimpliSafe Original has Unencrypted Keypad Transmissions, which allows physically proximate attackers to discover the PIN. SimpliSafe Original Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SimpliSafe Original is a home security management system. The system includes video surveillance and intrusion alarms, among other things. There is a security flaw in SimpliSafe Original, which stems from not encrypting the transmission. An attacker in close physical proximity could exploit this vulnerability to obtain a PIN
| VAR-201805-1208 | No CVE | PLCWinNT software has a memory leak vulnerability |
CVSS V2: 4.6 CVSS V3: - Severity: MEDIUM |
CoDeSys is a complete development environment for programmable logic control PLCs, in which simulation functions can be implemented by configuring the PLCWinNT software.
A memory leak vulnerability exists in the PLCWinNT software corresponding to the CoDeSys software version V2. An attacker can perform arbitrary write operations on the process's memory address space, and this vulnerability can be used to implement remote code execution
| VAR-201805-1151 | CVE-2018-7526 | BeaconMedaes Scroll Medical Air Systems TotalAlert Web Application Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, by accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access information in the application without authenticating. BeaconMedaes Scroll Medical Air Systems Contains an access control vulnerability.Information may be obtained. The TotalAlert Web Application is one of the web-based hypervisors
| VAR-201805-1054 | CVE-2018-8013 | Apache Batik Vulnerable to unreliable data deserialization |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
In Apache Batik 1.x before 1.10, when deserializing subclass of `AbstractDocument`, the class takes a string from the inputStream as the class name which then use it to call the no-arg constructor of the class. Fix was to check the class type before calling newInstance in deserialization. Apache Batik Contains a vulnerability in the deserialization of unreliable data.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apache Batik is prone to an information-disclosure vulnerability.
An attacker can exploit this issue to gain access to sensitive information; this may lead to further attacks.
Apache Batik 1.9.1 and prior versions are vulnerable.
Mitigation:
Users should upgrade to Batik 1.10+
Credit:
This issue was independently reported by Man Yue Mo.
References:
http://xmlgraphics.apache.org/security.html
The Apache XML Graphics team. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4215-1 security@debian.org
https://www.debian.org/security/ Sebastien Delafond
June 02, 2018 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : batik
CVE ID : CVE-2017-5662 CVE-2018-8013
Debian Bug : 860566 899374
Man Yue Mo, Lars Krapf and Pierre Ernst discovered that Batik, a
toolkit for processing SVG images, did not properly validate its
input. This would allow an attacker to cause a denial-of-service,
mount cross-site scripting attacks, or access restricted files on the
server.
For the oldstable distribution (jessie), these problems have been fixed
in version 1.7+dfsg-5+deb8u1.
For the stable distribution (stretch), these problems have been fixed in
version 1.8-4+deb9u1.
We recommend that you upgrade your batik packages.
For the detailed security status of batik please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/batik
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAlsSUFsACgkQEL6Jg/PV
nWQKAQgAtoVouiI8CAu0mMH4CxzV9Gn+PheDY9BIdjfARj60IPGFt1JgwJGwdhuS
ANRAYaYhwEl+ZJSi5QUunT+tmwjINkWVQ1OoQIULR+/51bbkPQsND8nj2rVsO8z4
BQFJqUVdpbF04nDAP2lxyLMevrS5v9bQTXZfchIQOYhu08+L4HHilnMzRKpeaFNo
jHBfpOhT4puftGQDtPW3+Czrree7yjkyElryVXiaNupH1PYuBs7GH3cGIct4NNv/
7cykB7tf0j7cL+82YOCe5PhWQJfF52uj4Uck92v+muV6G6H7/vNj8irfC+iW7sP1
s58xKHi+VG3tU66xb44dK4MteCk9SA==
=n3ZC
-----END PGP SIGNATURE-----
. ==========================================================================
Ubuntu Security Notice USN-3661-1
May 29, 2018
batik vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Batik could be made to expose sensitive information if it received
a specially crafted XML.
Software Description:
- batik: SVG Library
Details:
It was discovered that Batik incorrectly handled certain XML.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
libbatik-java 1.7.ubuntu-8ubuntu2.14.04.3
In general, a standard system update will make all the necessary
changes.
References:
https://usn.ubuntu.com/usn/usn-3661-1
CVE-2018-8013
Package Information:
https://launchpad.net/ubuntu/+source/batik/1.7.ubuntu-8ubuntu2.14.04.3
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202401-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Apache Batik: Multiple Vulnerabilities
Date: January 07, 2024
Bugs: #724534, #872689, #918088
ID: 202401-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Apache Batik, the worst of
which could result in arbitrary code execution.
Background
==========
Apache Batik is a Java-based toolkit for applications or applets that
want to use images in the Scalable Vector Graphics (SVG) format for
various purposes, such as display, generation or manipulation.
Affected packages
=================
Package Vulnerable Unaffected
-------------- ------------ ------------
dev-java/batik < 1.17 >= 1.17
Description
===========
Multiple vulnerabilities have been discovered in Apache Batik. Please
review the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Apache Batik users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/batik-1.17"
References
==========
[ 1 ] CVE-2018-8013
https://nvd.nist.gov/vuln/detail/CVE-2018-8013
[ 2 ] CVE-2019-17566
https://nvd.nist.gov/vuln/detail/CVE-2019-17566
[ 3 ] CVE-2020-11987
https://nvd.nist.gov/vuln/detail/CVE-2020-11987
[ 4 ] CVE-2022-38398
https://nvd.nist.gov/vuln/detail/CVE-2022-38398
[ 5 ] CVE-2022-38648
https://nvd.nist.gov/vuln/detail/CVE-2022-38648
[ 6 ] CVE-2022-40146
https://nvd.nist.gov/vuln/detail/CVE-2022-40146
[ 7 ] CVE-2022-41704
https://nvd.nist.gov/vuln/detail/CVE-2022-41704
[ 8 ] CVE-2022-42890
https://nvd.nist.gov/vuln/detail/CVE-2022-42890
[ 9 ] CVE-2022-44729
https://nvd.nist.gov/vuln/detail/CVE-2022-44729
[ 10 ] CVE-2022-44730
https://nvd.nist.gov/vuln/detail/CVE-2022-44730
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202401-11
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-201805-0951 | CVE-2018-8898 | D-Link DSL-3782 Authentication vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A flaw in the authentication mechanism in the Login Panel of router D-Link DSL-3782 (A1_WI_20170303 || SWVer="V100R001B012" FWVer="3.10.0.24" FirmVer="TT_77616E6771696F6E67") allows unauthenticated attackers to perform arbitrary modification (read, write) to passwords and configurations meanwhile an administrator is logged into the web panel. D-Link DSL-3782 Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDSL-3782 is a wireless router product from D-Link. LoginPanel is one of the login panels. A security vulnerability exists in the authentication mechanism of LoginPanel in D-LinkDSL-3782 (A1_WI_20170303)
| VAR-201805-1106 | CVE-2018-5241 | Symantec Advanced Secure Gateway and ProxySG Vulnerabilities related to security functions |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Symantec Advanced Secure Gateway (ASG) 6.6 and 6.7, and ProxySG 6.5, 6.6, and 6.7 are susceptible to a SAML authentication bypass vulnerability. The products can be configured with a SAML authentication realm to authenticate network users in intercepted proxy traffic. When parsing SAML responses, ASG and ProxySG incorrectly handle XML nodes with comments. A remote attacker can modify a valid SAML response without invalidating its cryptographic signature. This may allow the attacker to bypass user authentication security controls in ASG and ProxySG. This vulnerability only affects authentication of network users in intercepted traffic. It does not affect administrator user authentication for the ASG and ProxySG management consoles. Symantec Advanced Secure Gateway (ASG) and ProxySG Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This may lead to further attacks
| VAR-201807-0338 | CVE-2018-10607 | Martem TELEM-GW6/GWM Denial of service vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow the creation of new connections to one or more IOAs, without closing them properly, which may cause a denial of service within the industrial process control channel. Martem TELEM GW6 and GWM The device firmware contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities.
1. An security bypass vulnerability.
2. A denial-of-service vulnerability.
3. An cross-site scripting vulnerability.
Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition.
The following products are affected:
GW6 Version 2018.04.18-linux_4-01-601cb47 and prior.
GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company
| VAR-201807-0336 | CVE-2018-10603 | Martem TELEM GW6 and GWM Authentication vulnerabilities in device firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior do not perform authentication of IEC-104 control commands, which may allow a rogue node a remote control of the industrial process. Martem TELEM GW6 and GWM There is an authentication vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities.
1. An security bypass vulnerability.
2. A denial-of-service vulnerability.
3. An cross-site scripting vulnerability.
Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition.
The following products are affected:
GW6 Version 2018.04.18-linux_4-01-601cb47 and prior.
GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company. Martem GW6 2018.04.18-linux_4-01-601cb47 and earlier versions and GWM 2018.04.18-linux_4-01-601cb47 and earlier versions have an authorization problem vulnerability
| VAR-201807-0340 | CVE-2018-10609 | Martem TELEM-GW6/GWM Cross-Site Scripting Vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior allow improper sanitization of data over a Websocket which may allow cross-site scripting and client-side code execution with target user privileges. Martem TELEM GW6 and GWM The device firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Martem specializes in providing distribution network monitoring remote control systems, and its customers include distribution companies and industrial and transportation companies with their own power grids. Multiple Martem Products are prone to the following security vulnerabilities.
1. An security bypass vulnerability.
2. A denial-of-service vulnerability.
3. An cross-site scripting vulnerability.
Attackers can exploit these issues to bypass certain security restrictions to perform unauthorized actions, steal cookie-based authentication credentials, to execute arbitrary scripts in the context of the web browser. Failed exploit attempts will result in a denial-of-service condition.
The following products are affected:
GW6 Version 2018.04.18-linux_4-01-601cb47 and prior.
GWM Version 2018.04.18-linux_4-01-601cb47 and prior. Both Martem GW6 and GWM are data processor products of Estonian Martem Company. The vulnerability is caused by the program not filtering data correctly
| VAR-201805-0847 | CVE-2018-11340 | ASUSTOR AS6202T Vulnerable to unlimited upload of dangerous types of files |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
An unrestricted file upload vulnerability in importuser.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data to a specified filename. This can be used to place attacker controlled code on the file system that is then executed. ASUSTOR AS6202T Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSTOR AS6202T ADM is a set of ASUSTOR NAS storage device operating system developed by ASUSTOR
| VAR-201805-0852 | CVE-2018-11345 | ASUSTOR AS6202T Vulnerable to unlimited upload of dangerous types of files |
CVSS V2: 6.5 CVSS V3: 8.8 Severity: HIGH |
An unrestricted file upload vulnerability in upload.cgi in ASUSTOR AS6202T ADM 3.1.0.RFQ3 allows attackers to upload supplied data via the POST parameter filename. This can be used to place attacker controlled code on the file system that can then be executed. Further, the filename parameter is vulnerable to path traversal and allows the attacker to place the file anywhere on the system. ASUSTOR AS6202T Contains a vulnerability related to unlimited uploads of dangerous types of files.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ASUSTOR AS6202T ADM is a set of ASUSTOR NAS storage device operating system developed by ASUSTOR. The upload.cgi file in ASUSTOR AS6202T ADM 3.1.0.RFQ3 has a security vulnerability