📦 Tdc X401gl Firmware
by Sick
🔍 What is Tdc X401gl Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This critical vulnerability allows attackers to bypass security controls and access the host filesystem, enabling unauthorized reading and modification of system data. It affects systems running vulne...
This vulnerability allows remote attackers to gain full system access by uploading unvalidated container images to affected systems. It compromises both integrity and confidentiality, affecting system...
This vulnerability allows unauthorized access to system functions that control installed applications. Attackers can start, stop, or delete applications, potentially disrupting system operations. This...
This vulnerability allows attackers to gain unauthorized access to affected devices by using weak, publicly known default passwords on hidden user accounts. It affects industrial control systems and I...
This vulnerability allows attackers to inject malicious scripts via URL parameters, which execute in authenticated users' browsers. This can lead to session hijacking, credential theft, and data exfil...
This vulnerability allows attackers with limited permissions to write files to specific locations on affected devices, potentially enabling system manipulation. It affects SICK industrial control syst...
CVE-2026-22915 allows attackers with low privileges to read files from specific directories on affected devices, potentially exposing sensitive information. This vulnerability affects SICK industrial ...
This vulnerability allows low-privileged attackers to trigger critical system functions like reboot or factory reset without proper authorization. It affects systems running vulnerable versions of SIC...
This vulnerability involves improper input handling in a system endpoint that allows attackers to send crafted requests to overload resources, causing a denial of service. Systems running affected SIC...
This CVE describes a clickjacking vulnerability where attackers can trick users into performing unintended actions on web interfaces, potentially leading to sensitive data extraction. It affects web a...
This vulnerability exposes password hashes for system accounts within firmware update files. Remote attackers could recover credentials and gain unauthorized access to affected devices. This impacts s...
This vulnerability allows attackers to redirect authenticated users to malicious websites through improper validation of a login parameter. It affects systems using SICK products with vulnerable authe...
This vulnerability affects devices where passwords are stored without proper salting, allowing attackers to more easily extract and crack passwords through offline attacks. It impacts systems using vu...
This vulnerability allows attackers with administrative access to inject malicious scripts into the login page, enabling cross-site scripting (XSS) attacks that could steal sensitive user data. Organi...