Vulnerability Database

318,638

Total vulnerabilities in the database

CVE-2025-1036

Command injection vulnerability exists in the “Logging” page of the web-based configuration utility. An authenticated user with low privileged network access for the configuration utility can execute arbitrary commands on the underlying OS to obtain root SSH access to the TropOS 4th Gen device.

No technical information available.

CWEs:

OWASP TOP 10: