Vulnerability Description
An issue was discovered on Topcon Positioning Net-G5 GNSS Receiver devices with firmware 5.2.2. The web interface of the product has a local file inclusion vulnerability. An attacker with administrative privileges can craft a special URL to read arbitrary files from the device's files system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Topcon | Net-G5 Firmware | 5.2.2 |
| Topcon | Net-G5 | - |
Related Weaknesses (CWE)
References
- https://mezdanak.de/2019/06/21/iot-full-disclosure-topcon-positioning-net-g5-recExploitThird Party Advisory
- https://mezdanak.de/2019/06/21/iot-full-disclosure-topcon-positioning-net-g5-recExploitThird Party Advisory
FAQ
What is CVE-2019-11327?
CVE-2019-11327 is a vulnerability with a CVSS score of 4.9 (MEDIUM). An issue was discovered on Topcon Positioning Net-G5 GNSS Receiver devices with firmware 5.2.2. The web interface of the product has a local file inclusion vulnerability. An attacker with administrati...
How severe is CVE-2019-11327?
CVE-2019-11327 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11327?
Check the references section above for vendor advisories and patch information. Affected products include: Topcon Net-G5 Firmware, Topcon Net-G5.