Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sc9705_firmware
(Timetoolsltd)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-02-13 | CVE-2020-8964 | TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to bypass authentication by placing t3axs=TiMEtOOlsj7G3xMm52wB in a t3.cgi request, aka a "hardcoded cookie." | Sc7105_firmware, Sc9205_firmware, Sc9705_firmware, Sr7110_firmware, Sr9210_firmware, Sr9750_firmware, Sr9850_firmware, T100_firmware, T300_firmware, T550_firmware | N/A | ||
2020-02-13 | CVE-2020-8963 | TimeTools SC7105 1.0.007, SC9205 1.0.007, SC9705 1.0.007, SR7110 1.0.007, SR9210 1.0.007, SR9750 1.0.007, SR9850 1.0.007, T100 1.0.003, T300 1.0.003, and T550 1.0.003 devices allow remote attackers to execute arbitrary OS commands via shell metacharacters in the t3.cgi srmodel or srtime parameter. | Sc7105_firmware, Sc9205_firmware, Sc9705_firmware, Sr7110_firmware, Sr9210_firmware, Sr9750_firmware, Sr9850_firmware, T100_firmware, T300_firmware, T550_firmware | N/A |