Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 27 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 25 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware |
|
| CPEs | cpe:2.3:h:binardat:10g08-0800gsm:-:*:*:*:*:*:*:* cpe:2.3:o:binardat:10g08-0800gsm_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware |
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Binardat
Binardat 10g08-0800gsm Network Switch |
|
| Vendors & Products |
Binardat
Binardat 10g08-0800gsm Network Switch |
Tue, 24 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain a command injection vulnerability in the traceroute diagnostic function of the affected device web management interface. By injecting the %1a character into the hostname parameter, an authenticated attacker with access to the web interface can execute arbitrary CLI commands on the device. | |
| Title | Binardat 10G08-0800GSM Network Switch Traceroute CLI Command Injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-27T18:59:45.204Z
Reserved: 2026-01-14T17:13:44.903Z
Link: CVE-2026-23678
Updated: 2026-02-27T18:59:39.914Z
Status : Analyzed
Published: 2026-02-24T16:24:08.090
Modified: 2026-02-25T17:12:08.403
Link: CVE-2026-23678
No data.
OpenCVE Enrichment
Updated: 2026-04-16T16:30:15Z