Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Copeland LP — Vulnerabilities & Security Advisories 10

Browse all 10 CVE security advisories affecting Copeland LP. AI-powered Chinese analysis, POCs, and references for each vulnerability.

CVE IDTitleCVSSSeverityPublished
CVE-2025-52551 Proprietary protocol allows for unauthenticated file operations — E2 Facility Management SystemCWE-306 9.8AICriticalAI2025-09-02
CVE-2025-52550 Firmware upgrade packages are unsigned — E3 Supervisory ControlCWE-347 4.9AIMediumAI2025-09-02
CVE-2025-52549 Predictable root linux password generation — E3 Supervisory ControlCWE-522 9.8AICriticalAI2025-09-02
CVE-2025-52548 Enabling SSH and Shellinabox on the vulnerable machine — E3 Supervisory ControlCWE-1242 7.2AIHighAI2025-09-02
CVE-2025-52547 DoS to the application services — E3 Supervisory ControlCWE-20 7.5AIHighAI2025-09-02
CVE-2025-52546 Stored XSS by uploading a specially crafted floor plan file — E3 Supervisory ControlCWE-434 6.1AIMediumAI2025-09-02
CVE-2025-52545 Privilege escalation in the application services — E3 Supervisory ControlCWE-522 9.1AICriticalAI2025-09-02
CVE-2025-52544 Arbitrary read file from the filesystem — E3 Supervisory ControlCWE-20 7.5AIHighAI2025-09-02
CVE-2025-52543 Login to the application services using only the password hash — E3 Supervisory ControlCWE-836 9.8AICriticalAI2025-09-02
CVE-2025-6519 Consistent predictable generation of the password for the default admin user "ONEDAY" to the application services — E3 Supervisory ControlCWE-522 9.8AICriticalAI2025-09-02

This page lists every published CVE security advisory associated with Copeland LP. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.