KUNBUS RevPi Webstatus
This vulnerability allows attackers to bypass authentication on the Revolution Pi Webstatus interface through an authentication bypass flaw (CWE-303), enabling unauthorized access to the application without valid credentials. Successful exploitation allows attackers to gain full administrative access to RevPi systems. The Webstatus service is a web-based management interface commonly used for remote monitoring and configuration of Revolution Pi industrial computers. The vulnerability affects Webstatus versions 2.4.5 and prior. Mitigation includes updating to version 2.4.6, restricting network access to the interface, and isolating RevPi devices from untrusted networks.
- Network access to the Webstatus interface (typically port 8088)
- No valid credentials required
/api/v1/advisories/21848a7d-d025-471e-b4db-b823ee36aa58Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.