BINOM3 Electric Power Quality Meter (Update A)
BINOM3 Universal multifunctional electric power quality meter (all versions) contains multiple critical vulnerabilities including cross-site scripting (CWE-79), broken access control (CWE-284), missing CSRF protection (CWE-352), information disclosure (CWE-200), and use of hardcoded credentials (CWE-259). These vulnerabilities allow unauthenticated remote attackers with network access to execute arbitrary commands, bypass authentication, access sensitive data, and modify meter configuration. No vendor patch is planned—end-of-life status applies to all versions.
- Network access to the power meter's web interface (typically port 80/443)
- No authentication required for initial exploitation
- Meter must be connected to your network or accessible from an attacker's network position
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ddf93ae4-3d01-4f16-92d2-9f90eee8eafcGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.