Lucene search

K
WinstonprivacyWinston Firmware

8 matches found

CVE
CVE
added 2020/10/28 5:15 p.m.35 views

CVE-2020-16257

Winston 1.5.4 devices are vulnerable to command injection via the API.

10CVSS9.7AI score0.0627EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.30 views

CVE-2020-16256

The API on Winston 1.5.4 devices is vulnerable to CSRF.

9.3CVSS8.7AI score0.00154EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.29 views

CVE-2020-16260

Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation.

7.5CVSS7.7AI score0.00206EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.28 views

CVE-2020-16262

Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.

7.8CVSS7.6AI score0.0004EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.27 views

CVE-2020-16259

Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.

10CVSS9.3AI score0.00398EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.26 views

CVE-2020-16261

Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access.

7.2CVSS6.6AI score0.00043EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.25 views

CVE-2020-16263

Winston 1.5.4 devices have a CORS configuration that trusts arbitrary origins. This allows requests to be made and viewed by arbitrary origins.

9.1CVSS9.1AI score0.00307EPSS
CVE
CVE
added 2020/10/28 6:15 p.m.21 views

CVE-2020-16258

Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials.

7.1CVSS6.9AI score0.0004EPSS