Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-16722 | A vulnerability was found in Baison Channel Middleware Product 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file /e3api/api/main/ToJsonByControlName. The manipulation of the argument data leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. |
Wed, 02 Jul 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Baison
Baison channel Middleware Product |
|
| CPEs | cpe:2.3:a:baison:channel_middleware_product:2.0.1:*:*:*:*:*:*:* | |
| Vendors & Products |
Baison
Baison channel Middleware Product |
Tue, 03 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Jun 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Baison Channel Middleware Product 2.0.1 and classified as critical. Affected by this issue is some unknown functionality of the file /e3api/api/main/ToJsonByControlName. The manipulation of the argument data leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
| Title | Baison Channel Middleware Product ToJsonByControlName sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-06-03T13:14:30.087Z
Reserved: 2025-06-03T04:31:47.580Z
Link: CVE-2025-5493
Updated: 2025-06-03T13:14:26.565Z
Status : Analyzed
Published: 2025-06-03T11:15:21.230
Modified: 2025-07-02T14:31:01.553
Link: CVE-2025-5493
No data.
OpenCVE Enrichment
No data.
EUVD