Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-40981
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
ETIC Telecom Remote Access Server Unrestricted Upload of File with Dangerous Type
Source: NVD (National Vulnerability Database)
Vulnerability Description
All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
危险类型文件的不加限制上传
Source: NVD (National Vulnerability Database)
Vulnerability Title
ETIC Telecom Remote Access Server 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ETIC Telecom Remote Access Server是法国ETIC Telecom公司的一种远程维护解决方案。旨在使制造商远程即可维护自动化设备。 ETIC Telecom Remote Access Server 4.5.0版本及之前版本存在代码问题漏洞。攻击者利用该漏洞可以获取敏感信息并危害易受攻击的设备和其他连接的机器。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
ETIC TelecomRemote Access Server (RAS) 0 ~ 4.5.0 -
II. Public POCs for CVE-2022-40981
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-40981
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-40981

No comments yet


Leave a comment