PatchSiren

Binom3 CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

HIGH Binom3 CVE published 2017-02-13

CVE-2017-5167

CVE-2017-5167 describes a password-management weakness in BINOM3 Universal Multifunctional Electric Power Quality Meter firmware: users do not have an option to change their own passwords. In the NVD record, this is scored as HIGH severity with network-adjacent impact potential and is mapped to CWE-798 (Use of Hard-coded Credentials). For operators, the main concern is that account control may depend on f [truncated]

CRITICAL Binom3 CVE published 2017-02-13

CVE-2017-5166

CVE-2017-5166 is a critical information exposure vulnerability in BINOM3 Universal Multifunctional Electric Power Quality Meter firmware. The publicly available record says exposed information can be used to gain privileged access to the device. NVD rates the issue CVSS 3.0 9.8 and maps it to CWE-200.

HIGH Binom3 CVE published 2017-02-13

CVE-2017-5165

CVE-2017-5165 is a cross-site request forgery (CSRF) issue affecting BINOM3 Universal Multifunctional Electric Power Quality Meter firmware. According to NVD, the flaw stems from missing CSRF tokens on pages and/or sensitive functions, which can let a remote attacker cause unauthorized device actions with no direct authentication, including configuration changes and saving modified settings.

MEDIUM Binom3 CVE published 2017-02-13

CVE-2017-5164

CVE-2017-5164 is a cross-site scripting (XSS) vulnerability in BINOM3 Universal Multifunctional Electric Power Quality Meter firmware. The NVD record classifies it as CWE-79 and rates it CVSS 6.1 (Medium). Because the vector is network-based and user interaction is required, the main concern is browser-session compromise for users who access the affected interface.

CRITICAL Binom3 CVE published 2017-02-13

CVE-2017-5162

CVE-2017-5162 describes a critical missing-authentication issue in BINOM3 Universal Multifunctional Electric Power Quality Meter firmware. According to NVD, a remote service can be reached without authentication and may expose application setup and configuration functions. Because the issue is network-reachable and requires no privileges or user interaction, it is rated CVSS 9.8 and should be treated as a [truncated]