Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
The vendor provides a firmware update to version 7.40 (or higher) which can be downloaded via the vendor's customer server portal.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 11 Dec 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Dec 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 11 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users. | |
| Title | Cross-Site Request-Forgery | |
| Weaknesses | CWE-352 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T21:54:25.009Z
Reserved: 2024-03-05T09:15:40.202Z
Link: CVE-2024-28141
Updated: 2025-11-03T21:54:25.009Z
Status : Deferred
Published: 2024-12-11T16:15:10.160
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-28141
No data.
OpenCVE Enrichment
No data.