LOYTEC Electronics LINX Series
LOYTEC LINX Series building automation controllers contain multiple vulnerabilities in HTTP communication and firmware verification that allow attackers to disclose sensitive information (credentials, configuration data) or modify device settings without authentication. Affected products include LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, and L-INX Configurator software across all versions. Vulnerabilities include unencrypted transmission of sensitive data (CWE-319), missing authentication (CWE-306), unencrypted storage of credentials (CWE-312), and improper access control on configuration files (CWE-284).
- Network access to the LOYTEC device on the HTTP port (typically 80)
- LOYTEC device must have HTTP enabled (default configuration)
- For firmware modification exploits: ability to reach the firmware upload interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b0f220f0-15af-44c6-9e46-26a8610b9ab0Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.