Planex
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Planex product.
RSS Feeds for Planex security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Planex products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Planex Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Planex. Last year, in 2025 Planex had 2 security vulnerabilities published. Right now, Planex is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 0.00 |
| 2024 | 1 | 6.50 |
| 2023 | 3 | 6.70 |
It may take a day or so for new Planex vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Planex Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2021-4468 | Nov 14, 2025 |
Planex CS-QP50F-ING2 cameras: Unauth HTTP Config Backup Exposes Admin CredentialsPLANEX CS-QP50F-ING2 smart cameras expose a configuration backup interface over HTTP that does not require authentication. A remote, unauthenticated attacker can directly retrieve a compressed configuration backup file from the device. The backup contains sensitive configuration information, including credentials, allowing an attacker to obtain administrative access to the camera and compromise the confidentiality of the monitored environment. |
|
| CVE-2025-62777 | Oct 28, 2025 |
MZK-DP300N 1.07 and earlier: Hard-Coded Creds via Telnet Local Network AttackUse of Hard-Coded Credentials issue exists in MZK-DP300N version 1.07 and earlier, which may allow an attacker within the local network to log in to the affected device via Telnet and execute arbitrary commands. |
|
| CVE-2024-45372 | Sep 26, 2024 |
MZK-DP300N firmware 1.04 CSRF via web admin pageMZK-DP300N firmware versions 1.04 and earlier contains a cross-site request forger vulnerability. Viewing a malicious page while logging in to the web management page of the affected product may lead the user to perform unintended operations such as changing the login password, etc. |
|
| CVE-2023-22376 | Feb 14, 2023 |
Reflected XSS in Wired/Wireless LAN Camera CS-WMV02G (CVE-2023-22376)Reflected cross-site scripting vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a remote unauthenticated attacker to inject arbitrary script to inject an arbitrary script. NOTE: This vulnerability only affects products that are no longer supported by the developer. |
|
| CVE-2023-22375 | Feb 14, 2023 |
CSRF in CS-WMV02G Wired/Wireless Pan/Tilt LAN Camera Remote Auth HijackCross-site request forgery (CSRF) vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a remote unauthenticated attacker to hijack the authentication and conduct arbitrary operations by having a logged-in user to view a malicious page. NOTE: This vulnerability only affects products that are no longer supported by the developer. |
|
| CVE-2023-22370 | Feb 14, 2023 |
Stored XSS in CS-WMV02G Network CameraStored cross-site scripting vulnerability in Wired/Wireless LAN Pan/Tilt Network Camera CS-WMV02G all versions allows a network-adjacent authenticated attacker to inject an arbitrary script. NOTE: This vulnerability only affects products that are no longer supported by the developer. |
|
| CVE-2013-6026 | Oct 19, 2013 |
The web interface on D-Link DIR-100, DIR-120, DI-624S, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 routers; Planex BRL-04R, BRL-04UR, and BRL-04CW routers; and Alpha Networks routersThe web interface on D-Link DIR-100, DIR-120, DI-624S, DI-524UP, DI-604S, DI-604UP, DI-604+, and TM-G5240 routers; Planex BRL-04R, BRL-04UR, and BRL-04CW routers; and Alpha Networks routers allows remote attackers to bypass authentication and modify settings via an xmlset_roodkcableoj28840ybtide User-Agent HTTP header, as exploited in the wild in October 2013. |
And others... |