PatchSiren cyber security CVE debrief
CVE-2016-5813 Visonic CVE debrief
CVE-2016-5813 is a medium-severity information disclosure flaw in Visonic PowerLink2 firmware. According to the NVD description, accessing a specific image URL can cause the downloaded image response to carry source code used by the web server. The issue applies to all versions prior to the October 2016 firmware release. The published CVSS v3.0 vector is network-reachable with no privileges or user interaction required and impacts confidentiality only.
- Vendor
- Visonic
- Product
- CVE-2016-5813
- CVSS
- MEDIUM 5.3
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Organizations that deploy or support Visonic PowerLink2 devices, especially security integrators, facility operators, and teams responsible for embedded or industrial-style networked equipment should review exposure and firmware status.
Technical summary
NVD classifies the weakness as CWE-200 (Information Exposure) with CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The reported behavior is that a specific image URL returns downloaded content that includes source code used in the device web server. That means remote, unauthenticated access may reveal implementation details that are not meant to be exposed, but the supplied record does not indicate integrity or availability impact.
Defensive priority
Moderate. The issue is easy to reach over the network and exposes source code, but the supplied record indicates confidentiality impact only and no evidence of code execution or service disruption.
Recommended defensive actions
- Upgrade Visonic PowerLink2 firmware to the October 2016 release or later, as described in the vulnerability summary.
- Restrict network access to the device management interface so only trusted administrators can reach it.
- Inventory deployed PowerLink2 devices and verify whether any remain on firmware versions prior to the October 2016 release.
- Review exposed web content and logs for unexpected requests to image or related URLs.
- Consult the US-CERT/ICS advisory and the NVD record for any vendor-specific remediation guidance.
Evidence notes
The CVE description states that when a specific URL to an image is accessed, the downloaded image carries source code used in the web server. NVD maps the weakness to CWE-200 and assigns CVSS v3.0 vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N. The affected scope in the supplied record is Visonic PowerLink2 firmware versions prior to the October 2016 release.
Official resources
-
CVE-2016-5813 CVE record
CVE.org
-
CVE-2016-5813 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, US Government Resource
Publicly disclosed in the official CVE record and NVD entry published on 2017-02-13. The supplied references include a US-CERT/ICS advisory and SecurityFocus BID 94894.