Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openplcproject
Openplcproject openplc Openplcproject openplc V3 |
|
| Vendors & Products |
Openplcproject
Openplcproject openplc Openplcproject openplc V3 |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenPLC v3 contains an authenticated remote code execution vulnerability that allows attackers with valid credentials to inject malicious code through the hardware configuration interface. Attackers can upload a custom hardware layer with embedded reverse shell code that establishes a network connection to a specified IP and port, enabling remote command execution. | |
| Title | OpenPLC 3 - Remote Code Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:06:05.080Z
Reserved: 2026-01-14T14:39:44.736Z
Link: CVE-2021-47770
Updated: 2026-01-22T16:22:58.848Z
Status : Deferred
Published: 2026-01-21T18:16:09.080
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-47770
No data.
OpenCVE Enrichment
Updated: 2026-01-22T10:15:18Z