Advantech System Integration services HW/SW
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Advantech product.
RSS Feeds for Advantech security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Advantech products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Advantech Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 2 vulnerabilities in Advantech with an average score of 8.6 out of ten. Last year, in 2025 Advantech had 38 security vulnerabilities published. Right now, Advantech is on track to have less security vulnerabilities in 2026 than it did last year. However, the average CVE base score of the vulnerabilities in 2026 is greater by 1.54.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 2 | 8.60 |
| 2025 | 38 | 7.06 |
| 2024 | 7 | 7.10 |
| 2023 | 10 | 8.84 |
| 2022 | 15 | 7.90 |
| 2021 | 62 | 7.32 |
| 2020 | 28 | 8.45 |
| 2019 | 31 | 9.23 |
| 2018 | 28 | 7.18 |
It may take a day or so for new Advantech vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Advantech Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-2670 | Feb 18, 2026 |
OS Command Injection Advantech WISE-6610 1.2.1_20251110 openvpn_applyA vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown function of the file /cgi-bin/luci/admin/openvpn_apply of the component Background Management. Such manipulation of the argument delete_file leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. |
|
| CVE-2025-52694 | Jan 12, 2026 |
SQLi Remote Exec in Unknown Web ServiceSuccessful exploitation of the SQL injection vulnerability could allow an unauthenticated remote attacker to execute arbitrary SQL commands on the vulnerable service when it is exposed to the Internet, potentially affecting data confidentiality, integrity, and availability. Users and administrators of affected product versions are advised to update to the latest versions immediately. |
|
| CVE-2025-67653 | Dec 18, 2025 |
Advantech WebAccess/SCADA Directory Traversal (CVE-2025-67653)Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files. |
|
| CVE-2025-46268 | Dec 18, 2025 |
SQLi in Advantech WebAccess/SCADAAdvantech WebAccess/SCADA is vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands. |
|
| CVE-2025-14848 | Dec 18, 2025 |
Advantech WebAccess/SCADA Abs Dir TraversalAdvantech WebAccess/SCADA is vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files. |
|
| CVE-2025-14849 | Dec 18, 2025 |
Advantech WebAccess SCADA Unrestricted File Upload Allowing Remote Code ExecAdvantech WebAccess/SCADA is vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code. |
|
| CVE-2025-14850 | Dec 18, 2025 |
Dir Traversal in Advantech WebAccess/SCADA Allows Arbitrary File DeletionAdvantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files. |
|
| CVE-2025-14252 | Dec 16, 2025 |
Priv Esc in Advantech SUSI Driver 5.0.24335 via Improper AccessAn Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to read/write arbitrary memory, I/O ports, and MSRs, resulting in privilege escalation, arbitrary code execution, and information disclosure. This issue affects Advantech SUSI: 5.0.24335 and prior. |
|
| CVE-2025-13373 | Dec 04, 2025 |
Advantech iView <=5.7.05.7057 SQL injection via SNMP v1 trap (Port 162)Advantech iView versions 5.7.05.7057 and prior do not properly sanitize SNMP v1 trap (Port 162) requests, which could allow an attacker to inject SQL commands. |
|
| CVE-2025-58423 | Nov 06, 2025 |
Insufficient Sanitization in File Upload Enables Path Traversal, File Access and DOS (CVE-2025-58423Due to insufficient sanitization, an attacker can upload a specially crafted configuration file to cause a denial-of-service condition, traverse directories, or read/write files, within the context of the local system account. |
|
| CVE-2025-59171 | Nov 06, 2025 |
RCE via Unsanitized Config File Upload and Directory TraversalDue to insufficient sanitization, an attacker can upload a specially crafted configuration file to traverse directories and achieve remote code execution with system-level permissions. |
|
| CVE-2025-62630 | Nov 06, 2025 |
Unsanitized Config File Upload Enables Directory Traversal RCEDue to insufficient sanitization, an attacker can upload a specially crafted configuration file to traverse directories and achieve remote code execution with system-level permissions. |
|
| CVE-2025-64302 | Nov 06, 2025 |
CVE-2025-64302: Dashboard Label/Path Injection Causing Device ErrorInsufficient input sanitization in the dashboard label or path can allow an attacker to trigger a device error causing information disclosure or data manipulation. |
|
| CVE-2022-50595 | Nov 06, 2025 |
Advantech iView <=5.7.04 SNMP Auth Bypass + SQLi RCEAdvantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ztp_search_value parameter to the NetworkServlet endpoint. Successful exploitation allows for remote code execution with administrator privileges. |
|
| CVE-2022-50591 | Nov 06, 2025 |
Advantech iView <5.7.04 SQL injection via SNMPAdvantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ztp_config_id parameter to the NetworkServlet endpoint. Successful exploitation allows for the exfiltration of user data, included clear text passwords. |
|
| CVE-2022-50593 | Nov 06, 2025 |
Advantech iView <5.7.04: SNMP Auth Bypass + SQLi RCEAdvantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the search_term parameter to the NetworkServlet endpoint. Successful exploitation allows for remote code execution with administrator privileges. |
|
| CVE-2022-50592 | Nov 06, 2025 |
Advantech iView before v5.7.04: SNMP Auth Bypass + SQLi RCEAdvantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the getInventoryReportData parameter to the NetworkServlet endpoint. Successful exploitation allows for remote code execution with administrator privileges. |
|
| CVE-2022-50594 | Nov 06, 2025 |
Advantech iView <=5.7.04 SNMP Auth Bypass + SQLi in NetworkServletAdvantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the data parameter to the NetworkServlet endpoint. Successful exploitation allows for the exfiltration of user data, included clear text passwords. |
|
| CVE-2025-34247 | Nov 06, 2025 |
Advantech WebAccess VPN 1.1.5 SQLi via NetworksController.addNetworkAction()Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in NetworksController.addNetworkAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34246 | Nov 06, 2025 |
Advantech WebAccess/VPN <1.1.5: SQLi via AjaxPrevalidationControllerAdvantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxPrevalidationController.ajaxAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34245 | Nov 06, 2025 |
Advantech WebAccess/VPN SQLi prior to 1.1.5 via AjaxStandaloneVpnClientsControllerAdvantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxStandaloneVpnClientsController.ajaxAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34244 | Nov 06, 2025 |
SQLi in Advantech WebAccess/VPN <1.1.5 via AjaxFwRulesControllerAdvantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxFwRulesController.ajaxDeviceFwRulesAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34243 | Nov 06, 2025 |
SQLi in Advantech WebAccess/VPN <1.1.5 via AjaxFwRulesControllerAdvantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxFwRulesController.ajaxNetworkFwRulesAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34242 | Nov 06, 2025 |
Advantech WebAccess/VPN <=1.1.4: Auth observer SQLi via AjaxNetworkControllerAdvantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxNetworkController.ajaxAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34241 | Nov 06, 2025 |
Advantech WebAccess/VPN <=1.1.4: SQLi in AjaxDeviceControllerAdvantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxDeviceController.ajaxDeviceAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34240 | Nov 06, 2025 |
SQLi via AuthObs in Advantech WebAcc/VPN <1.1.5 AppMgmtCtrl.appUpgradeAction()Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information. |
|
| CVE-2025-34239 | Nov 06, 2025 |
Advantech WebAccess/VPN <1.1.5: Auth Cmd Injection via AppMgmtCtrlAdvantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated system administrator to execute arbitrary commands as the web server user (www-data) by supplying a crafted uploaded filename. |
|
| CVE-2025-34238 | Nov 06, 2025 |
Advantech WebAccess/VPN <1.1.5: Authenticated Path Traversal ExploitAdvantech WebAccess/VPN versions prior to 1.1.5 contain an absolute path traversal via AjaxStandaloneVpnClientsController.ajaxDownloadRoadWarriorConfigFileAction() that allows an authenticated network administrator to cause the application to read and return the contents of arbitrary files the web user (www-data) can access. |
|
| CVE-2025-34237 | Nov 06, 2025 |
Advantech WebAccess/VPN <1.1.5 XSS via addStandaloneVpnClientAction()Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerability via StandaloneVpnClientsController.addStandaloneVpnClientAction(). Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser. |
|
| CVE-2025-34236 | Nov 06, 2025 |
Advantech WebAccess/VPN <1.1.5 XSS via NetworksController.addNetworkAction()Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerability via NetworksController.addNetworkAction(). Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser. |
|
| CVE-2025-52459 | Jul 11, 2025 |
Advantech iView Argument Injection in NetworkServlet via Unsanitized ParametersA vulnerability exists in Advantech iView that allows for argument injection in NetworkServlet.backupDatabase(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters can be used directly in a command without proper sanitization, allowing arbitrary arguments to be injected. This can result in information disclosure, including sensitive database credentials. |
|
| CVE-2025-53397 | Jul 11, 2025 |
Advantech iView <5.7.05 build7057 Reflected XSS in Web UIA vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By exploiting this flaw, an attacker could execute unauthorized scripts in the user's browser, potentially leading to information disclosure or other malicious activities. |
|
| CVE-2025-53509 | Jul 11, 2025 |
Advantech iView NetworkServlet Arg Injection Enables Credential ExposureA vulnerability exists in Advantech iView that allows for argument injection in the NetworkServlet.restoreDatabase(). This issue requires an authenticated attacker with at least user-level privileges. An input parameter can be used directly in a command without proper sanitization, allowing arbitrary arguments to be injected. This can result in information disclosure, including sensitive database credentials. |
|
| CVE-2025-53515 | Jul 11, 2025 |
SQLi & RCE via NetworkServlet.archiveTrap() in Advantech iViewA vulnerability exists in Advantech iView that allows for SQL injection and remote code execution through NetworkServlet.archiveTrap(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account. |
|
| CVE-2025-41442 | Jul 11, 2025 |
Advantech iView Reflected XSS before 5.7.05b7057A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By manipulating certain input parameters, an attacker could execute unauthorized scripts in the user's browser, potentially leading to information disclosure or other malicious activities. |
|
| CVE-2025-46704 | Jul 11, 2025 |
Directory Traversal in Advantech iView via NetworkServlet.processImportRequestA vulnerability exists in Advantech iView in NetworkServlet.processImportRequest() that could allow for a directory traversal attack. This issue requires an authenticated attacker with at least user-level privileges. A specific parameter is not properly sanitized or normalized, potentially allowing an attacker to determine the existence of arbitrary files on the server. |
|
| CVE-2025-48891 | Jul 11, 2025 |
SQLi in Advantech iView via CUtils.checkSQLInjectionA vulnerability exists in Advantech iView that could allow for SQL injection through the CUtils.checkSQLInjection() function. This vulnerability can be exploited by an authenticated attacker with at least user-level privileges, potentially leading to information disclosure or a denial-of-service condition. |
|
| CVE-2025-52577 | Jul 11, 2025 |
Advantech iView SQLi & RCE via NetworkServlet.archiveTrapRange()A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account. |
|
| CVE-2025-53475 | Jul 11, 2025 |
Advantech iView SQLi & RCE via NetworkServlet.getNextTrapPage()A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account. |
|
| CVE-2025-53519 | Jul 11, 2025 |
Advantech iView <5.7.05 XSS Reflected ExploitA vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By manipulating specific parameters, an attacker could execute unauthorized scripts in the user's browser, potentially leading to information disclosure or other malicious activities. |
|
| CVE-2023-52335 | Nov 22, 2024 |
Advantech iView ConfigurationServlet SQL Injection Causing Credential DisclosureAdvantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863. |
|
| CVE-2024-28948 | Sep 27, 2024 |
Advantech ADAM-5630 CSRF VulnerabilityAdvantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other. |
|
| CVE-2024-39275 | Sep 27, 2024 |
Advantech ADAM5630 Persistent Cookie SessionFixationCookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user. |
|
| CVE-2024-38308 | Sep 27, 2024 |
Advantech ADAM 5550 XSS in Logs PageAdvantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received are displayed to the user. The device doesn't correctly neutralize malicious code when parsing HTTP requests to generate page output. |
|
| CVE-2024-34542 | Sep 27, 2024 |
Advantech ADAM-5630 Plain Text Credential Leak CVE-2024-34542Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process. |
|
| CVE-2024-37187 | Sep 27, 2024 |
Advantech ADAM-5550 insecure Base64 credential storage (CVE-2024-37187)Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding. |
|
| CVE-2024-2453 | Mar 21, 2024 |
Authenticated SQLi in Advantech WebAccess/SCADA DBThere is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database. |
|
| CVE-2023-5642 | Oct 18, 2023 |
Advantech R-SeeNet pre2.4.23 Unauth R/W to snmpmon.iniAdvantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information. |
|
| CVE-2023-4215 | Oct 17, 2023 |
Advantech WebAccess 9.1.3 Information Disclosure of CredentialsAdvantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials. |
|
| CVE-2023-1437 | Aug 02, 2023 |
Advantech WebAccess/SCADA RPC Untrusted Pointer RCE v<=9.1.4All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files. |
|