This vulnerability allows remote malicious users to escalate privileges on affected installations of Advantech R-SeeNet. Authentication is required to exploit this vulnerability. The specific flaw exists within the device_status page. The issue results from the lack of proper validation of user-supplied data prior to passing it to a PHP include function. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
advantech r-seenet |