spaceLYnk, Wiser For KNX, fellerLYnk
Multiple vulnerabilities exist in spaceLYnk (≤V2.6.2), Wiser for KNX (≤V2.6.2), and fellerLYnk (≤V2.6.2) controllers. These include missing authentication controls, Cross-Site Request Forgery (CSRF), rate limiting issues, and Stored Cross-Site Scripting (XSS) in the web management interface. An attacker could bypass login, trick authenticated users into performing unauthorized actions, inject malicious scripts, or exfiltrate system data and credentials. spaceLYnk and Wiser for KNX are fixed in version 2.7.0. fellerLYnk status is unclear from the advisory.
- Network access to the web management interface (typically port 80/443)
- For CSRF attacks: authenticated user must visit attacker-controlled page while logged into the system
- For XSS attacks: attacker must inject malicious payload through a vulnerable input field
- For authentication bypass: no special prerequisites—attacker can attempt direct access
Patching may require device reboot — plan for process interruption
/api/v1/advisories/58964008-f92a-4925-b187-b1b64d3bd196Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.