MegaSys Computer Technologies Telenium Online Web Application (Update A)
Telenium Online Web Application versions 8.3 and earlier contain an input validation flaw (CWE-20) that allows attackers to inject arbitrary Perl code through a crafted HTTP request. Successful exploitation results in remote code execution with server privileges. The vulnerability affects all instances of the web-based interface used for monitoring and controlling oil and gas production systems. No public exploitation has been reported, but the high CVSS score and ease of exploitation make this a critical priority.
- Network access to the Telenium Online Web Application (typically HTTP/HTTPS port 80 or 443)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3c836a28-2ba1-4cd8-8971-b868d3e14c35Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.