Filtered by vendor F-logic Subscriptions
Filtered by product Datacube3 Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-34854 1 F-logic 1 Datacube3 2025-02-13 9.8 Critical
F-logic DataCube3 v1.0 is vulnerable to File Upload via `/admin/transceiver_schedule.php.`
CVE-2024-34852 1 F-logic 1 Datacube3 2025-02-13 6.3 Medium
F-logic DataCube3 v1.0 is affected by command injection due to improper string filtering at the command execution point in the ./admin/transceiver_schedule.php file. An unauthenticated remote attacker can exploit this vulnerability by sending a file name containing command injection. Successful exploitation of this vulnerability may allow the attacker to execute system commands.
CVE-2024-25831 1 F-logic 1 Datacube3 2025-01-16 5.4 Medium
F-logic DataCube3 Version 1.0 is affected by a reflected cross-site scripting (XSS) vulnerability due to improper input sanitization. An authenticated, remote attacker can execute arbitrary JavaScript code in the web management interface.
CVE-2024-25832 1 F-logic 1 Datacube3 2025-01-16 8.8 High
F-logic DataCube3 v1.0 is vulnerable to unrestricted file upload, which could allow an authenticated malicious actor to upload a file of dangerous type by manipulating the filename extension.
CVE-2024-25833 1 F-logic 1 Datacube3 2025-01-16 9.8 Critical
F-logic DataCube3 v1.0 is vulnerable to unauthenticated SQL injection, which could allow an unauthenticated malicious actor to execute arbitrary SQL queries in database.
CVE-2024-7066 1 F-logic 2 Datacube3, Datacube3 Firmware 2024-11-21 7.3 High
A vulnerability was found in F-logic DataCube3 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/config_time_sync.php of the component HTTP POST Request Handler. The manipulation of the argument ntp_server leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272347.