[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"zh-security-advisories":3,"zh-header":95,"footer-default-zh":298,"all-advisories-lang-zh":442},{"name":4,"created_at":5,"published_at":6,"updated_at":7,"id":8,"uuid":9,"content":10,"slug":62,"full_slug":63,"sort_by_date":64,"position":65,"tag_list":66,"is_startpage":45,"parent_id":67,"meta_data":64,"group_id":68,"first_published_at":69,"release_id":64,"lang":70,"path":64,"alternates":71,"default_full_slug":72,"translated_slugs":73},"Security Advisories","2025-09-02T10:11:04.587Z","2025-12-01T09:54:30.432Z","2025-12-01T09:54:30.454Z",86500411800058,"6ce80674-3902-4e02-91ce-dcca086968bb",{"_uid":11,"body":12,"Keywords":28,"headline":50,"component":51,"meta_fields":52,"select_sub_menu":28},"480806f4-2352-4539-b86f-db31a9e2b75c",[13,47],{"_uid":14,"body":15,"label":28,"links":43,"bgColor":28,"headline":28,"markdown":28,"component":44,"leftAligned":45,"contentRight":46},"88b9f434-ecbc-4544-9c03-8cd1e4be9780",{"type":16,"content":17},"doc",[18,29,36],{"type":19,"content":20},"paragraph",[21],{"text":22,"type":23,"marks":24},"保证 AMR 的安全是一个持续的过程，贯穿于机器人的整个生命周期。作为您的供应商，MiR 会负责任地告知您已知的安全问题和建议采取的缓解措施。 ","text",[25],{"type":26,"attrs":27},"textStyle",{"color":28},"",{"type":19,"content":30},[31],{"text":32,"type":23,"marks":33},"在本页中，我们发布了与产品安全相关的已知问题的公告。请仔细阅读，以充分了解可能存在的风险和建议采取的缓解措施。 ",[34],{"type":26,"attrs":35},{"color":28},{"type":19,"content":37},[38],{"text":39,"type":23,"marks":40},"Mobile Industrial Robots A\u002FS 明确声明，对于因客户未严格按照用户手册操作机器人、未遵循和执行以下安全公告中的建议而造成的任何及所有损害或伤害，MiR将不承担任何责任。",[41],{"type":26,"attrs":42},{"color":28},[],"rich-text",true,[],{"_uid":48,"component":49},"cf215f59-440d-40d8-8f9b-5a730b2bb1fb","advisories-grid","安全提示","page",[53],{"_uid":54,"title":50,"noIndex":55,"OG_image":56,"OG_title":50,"component":61,"description":22,"OG_description":22},"be99bb06-7088-4e84-b650-7e87107c5127",false,{"id":57,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":58,"copyright":28,"fieldtype":59,"meta_data":60,"is_external_url":55},11224374,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F4096x2872\u002Fef55515ef3\u002Fmir600_mir1350_3.png","asset",{},"meta-fields","security-advisories","zh\u002Fsecurity-advisories\u002F",null,-380,[],86500070820312,"aff7aaf0-9afb-4937-8a16-e4a0ffdcc5a1","2025-09-29T08:30:57.670Z","zh",[],"security-advisories\u002F",[74,76,78,80,82,84,86,88,89,91,93],{"path":72,"name":64,"lang":75,"published":45},"da",{"path":72,"name":64,"lang":77,"published":45},"de",{"path":72,"name":64,"lang":79,"published":45},"it",{"path":72,"name":64,"lang":81,"published":45},"fr",{"path":72,"name":64,"lang":83,"published":45},"es",{"path":72,"name":64,"lang":85,"published":45},"ko",{"path":72,"name":64,"lang":87,"published":45},"ja",{"path":72,"name":64,"lang":70,"published":45},{"path":72,"name":64,"lang":90,"published":45},"tw",{"path":72,"name":64,"lang":92,"published":45},"pl",{"path":72,"name":64,"lang":94,"published":45},"cs",{"name":96,"created_at":97,"published_at":98,"updated_at":99,"id":100,"uuid":101,"content":102,"slug":104,"full_slug":278,"sort_by_date":64,"position":279,"tag_list":280,"is_startpage":55,"parent_id":281,"meta_data":64,"group_id":282,"first_published_at":283,"release_id":64,"lang":70,"path":64,"alternates":284,"default_full_slug":285,"translated_slugs":286},"Header","2023-05-25T10:50:16.809Z","2026-03-19T07:46:31.998Z","2026-04-02T16:49:48.234Z",313480493,"bafd24a7-f2d3-44e9-854d-5a5e76a957b4",{"_uid":103,"component":104,"header_menu":105,"portalTitle":181,"dropdown_title":182,"header_dropdown":183,"header_portal_switcher":241},"22e2fba0-faed-44f4-a77a-74073ce6c25a","header",[106,121,133,145,157,169],{"_uid":107,"link":108,"title":119,"component":120},"51622f66-37f1-4b03-9efc-770451007e96",{"id":109,"url":28,"linktype":110,"fieldtype":111,"cached_url":112,"prep":45,"story":113},"cc2f264a-e54d-4097-a11d-3e9b0af126e1","story","multilink","\u002Fzh\u002Fproducts\u002F",{"name":114,"id":115,"uuid":109,"slug":116,"url":117,"full_slug":118,"_stopResolving":45},"Products",325521696,"products","products\u002F","zh\u002Fproducts\u002F","产品","menu-link",{"_uid":122,"link":123,"title":132,"component":120},"999386f5-ddb5-4a4c-9695-f16c5a263284",{"id":124,"url":28,"linktype":110,"fieldtype":111,"cached_url":125,"prep":45,"story":126},"fdcb7cad-fe5b-424e-a5b6-95e61a6e7e2c","\u002Fzh\u002Fyour-amr-journey\u002F",{"name":127,"id":128,"uuid":124,"slug":129,"url":130,"full_slug":131,"_stopResolving":45},"Your AMR Journey",356660014,"your-amr-journey","your-amr-journey\u002F","zh\u002Fyour-amr-journey\u002F","您的 AMR 之旅",{"_uid":134,"link":135,"title":144,"component":120},"80432b01-ee11-4e0f-9fe9-b8aed52e318c",{"id":136,"url":28,"linktype":110,"fieldtype":111,"cached_url":137,"prep":45,"story":138},"8cbd5d80-2357-40d6-9270-4d58c47b9c2d","\u002Fzh\u002Fcases\u002F",{"name":139,"id":140,"uuid":136,"slug":141,"url":142,"full_slug":143,"_stopResolving":45},"Cases",326018479,"cases","cases\u002F","zh\u002Fcases\u002F","案例",{"_uid":146,"link":147,"title":156,"component":120},"ac56471a-9262-4d22-a5f3-80699f28ee78",{"id":148,"url":28,"linktype":110,"fieldtype":111,"cached_url":149,"prep":45,"story":150},"17b3687b-5324-48ff-abfc-1b05af4c7aa5","\u002Fzh\u002Findustries\u002F",{"name":151,"id":152,"uuid":148,"slug":153,"url":154,"full_slug":155,"_stopResolving":45},"Industries",335936187,"industries","industries\u002F","zh\u002Findustries\u002F","行业",{"_uid":158,"link":159,"title":168,"component":120},"ca78bf38-0026-4db8-8bf1-ff4727e36a85",{"id":160,"url":28,"linktype":110,"fieldtype":111,"cached_url":161,"prep":45,"story":162},"fac8ac6e-663a-4545-860c-b6762ea0d40b","\u002Fzh\u002Fabout\u002F",{"name":163,"id":164,"uuid":160,"slug":165,"url":166,"full_slug":167,"_stopResolving":45},"About",313472547,"about","about\u002F","zh\u002Fabout\u002F","关于我们",{"_uid":170,"link":171,"title":180,"component":120},"b51c3a9d-4d66-491b-b115-dbb593310c3f",{"id":172,"url":28,"linktype":110,"fieldtype":111,"cached_url":173,"prep":45,"story":174},"801bddfe-f04a-4089-9418-909bc2f67312","\u002Fzh\u002Fcontacts\u002F",{"name":175,"id":176,"uuid":172,"slug":177,"url":178,"full_slug":179,"_stopResolving":45},"Contact",389644485,"contacts","contacts\u002F","zh\u002Fcontacts\u002F","联系我们","Portals","服务与支持",[184,195,206,218,229],{"_uid":185,"link":186,"title":194,"component":120},"bffc1954-55b8-4952-be47-cc3cd04e26c0",{"id":187,"url":28,"linktype":110,"fieldtype":111,"cached_url":188,"prep":45,"story":189},"50c9e4be-1d49-4ca0-aec0-c0f84d229407","\u002Fzh\u002Fmir-academy",{"name":190,"id":191,"uuid":187,"slug":192,"url":192,"full_slug":193,"_stopResolving":45},"MiR Academy",430299874,"mir-academy","zh\u002Fmir-academy","MiR 学院",{"_uid":196,"link":197,"title":205,"component":120},"2a1188ce-e1b3-4634-aeff-a5337edcfcc4",{"id":198,"url":28,"linktype":110,"fieldtype":111,"cached_url":199,"prep":45,"story":200},"08dd7140-9581-47d7-9df1-7eb40e932e6e","\u002Fzh\u002Fcommunity",{"name":201,"id":202,"uuid":198,"slug":203,"url":203,"full_slug":204,"_stopResolving":45},"MiR Community",320145416,"community","zh\u002Fcommunity","MiR 社区",{"_uid":207,"link":208,"title":217,"component":120},"6fde37b5-a220-440b-ad34-b0fb215c90a0",{"id":209,"url":28,"linktype":110,"fieldtype":111,"cached_url":210,"prep":45,"story":211},"c9d027cd-40a7-4345-9edd-6eceb0d65825","\u002Fzh\u002Fservice-support\u002Ffinance",{"name":212,"id":213,"uuid":209,"slug":214,"url":215,"full_slug":216,"_stopResolving":45},"MiR Finance",404955355,"finance","service-support\u002Ffinance","zh\u002Fservice-support\u002Ffinance","MiR 财务",{"_uid":219,"link":220,"title":228,"component":120},"52185e6b-2937-424c-8493-ae513c5ee658",{"id":221,"url":28,"linktype":110,"fieldtype":111,"cached_url":222,"prep":45,"story":223},"5b534ff7-6a86-475e-a184-e742a32b433b","\u002Fzh\u002Fsupport-portal",{"name":224,"id":225,"uuid":221,"slug":226,"url":226,"full_slug":227,"_stopResolving":45},"MiR Support Portal",320145411,"support-portal","zh\u002Fsupport-portal","MiR 支持门户网站",{"_uid":230,"link":231,"title":240,"component":120},"d1205786-5e27-466a-918a-b276af399001",{"id":232,"url":28,"linktype":110,"fieldtype":111,"cached_url":233,"prep":45,"story":234},"951f0837-0bd2-482e-9a17-d8b766fc7571","\u002Fzh\u002Fservice-support\u002Fmir-service-activation",{"name":235,"id":236,"uuid":232,"slug":237,"url":238,"full_slug":239,"_stopResolving":45},"MiR service activation",552990532,"mir-service-activation","service-support\u002Fmir-service-activation","zh\u002Fservice-support\u002Fmir-service-activation","MiR Service Options",[242,252,261,269],{"_uid":243,"icon":244,"link":249,"name":250,"component":251},"e4bb7f1b-bff1-4b8e-b589-071a77ccd2fe",{"id":245,"alt":246,"name":28,"focus":28,"title":28,"source":28,"filename":247,"copyright":28,"fieldtype":59,"meta_data":248,"is_external_url":55},15422895,"MiR Main Website","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F39x40\u002Ff8b20084af\u002Fportal-switcher-main.svg",{"alt":246,"title":28,"source":28,"copyright":28},"https:\u002F\u002Fmobile-industrial-robots.com.cn\u002Fzh","Website","portal",{"_uid":253,"icon":254,"link":259,"name":260,"component":251},"9b78af37-4774-424d-b87e-4d3850b778a5",{"id":255,"alt":256,"name":28,"focus":28,"title":28,"source":28,"filename":257,"copyright":28,"fieldtype":59,"meta_data":258,"is_external_url":55},14298318,"how to guide","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F9687ef73ab\u002Ficon_featured-howto.svg",{},"https:\u002F\u002Fsupportportal.mobile-industrial-robots.com\u002F","Support Portal",{"_uid":262,"icon":263,"link":267,"name":268,"component":251},"a1dca106-baed-4db0-8bf2-b982f3c7d8b5",{"id":264,"alt":28,"name":28,"focus":28,"title":28,"source":28,"filename":265,"copyright":28,"fieldtype":59,"meta_data":266,"is_external_url":55},10103478,"https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F3e6d1ac02e\u002Ficon_corevalues_nextlevel.svg",{},"https:\u002F\u002Facademy.mobile-industrial-robots.com\u002F","Academy",{"_uid":270,"icon":271,"link":276,"name":277,"component":251},"268b8de5-88f7-491f-bc7e-c683e4d9b80f",{"id":272,"alt":273,"name":28,"focus":28,"title":28,"source":28,"filename":274,"copyright":28,"fieldtype":59,"meta_data":275,"is_external_url":55},13785060,"World share icon","https:\u002F\u002Fa.storyblok.com\u002Ff\u002F230581\u002F30x30\u002F0e54bc9d4e\u002Ficon_community_worldshare.svg",{},"https:\u002F\u002Fcommunity.mobile-industrial-robots.com\u002Fs\u002F","Community","zh\u002Fnavigation\u002Fheader",10,[],313907702,"8aa22c46-7145-43a7-91ea-8c1bdcf87a77","2023-05-25T10:51:41.897Z",[],"navigation\u002Fheader",[287,288,289,290,291,292,293,294,295,296,297],{"path":285,"name":64,"lang":75,"published":64},{"path":285,"name":64,"lang":77,"published":64},{"path":285,"name":64,"lang":79,"published":64},{"path":285,"name":64,"lang":81,"published":64},{"path":285,"name":64,"lang":83,"published":64},{"path":285,"name":64,"lang":85,"published":64},{"path":285,"name":64,"lang":87,"published":64},{"path":285,"name":64,"lang":70,"published":64},{"path":285,"name":64,"lang":90,"published":64},{"path":285,"name":64,"lang":92,"published":64},{"path":285,"name":64,"lang":94,"published":64},{"footerSections":299,"socialMedia":365,"socialMediaChina":381,"privacyPolicy":385,"cookiePolicy":399,"changeRegion":-1,"languageSwitcher":412},[300,318,342],{"title":301,"links":302},"初次接触 AMR？",[303,307,311,315,317],{"url":304,"id":305,"title":306,"isHiring":55},"zh\u002Fyour-amr-journey\u002Fgetting-started","4e1f0a89-b28f-466c-9384-3918efc93161","开始使用",{"url":308,"id":309,"title":310,"isHiring":55},"zh\u002Fblog\u002Fagv-vs-amr-whats-the-difference","8da1999f-4111-493b-987e-2eefa6c30260","什么是 AMR？",{"url":312,"id":313,"title":314,"isHiring":55},"zh\u002Fyour-amr-journey\u002Fsuccessful-deployment","be3b12bb-af44-42b3-ad92-f6dbb1816834","成功部署",{"url":118,"id":109,"title":316,"isHiring":55},"解决方案",{"url":143,"id":136,"title":144,"isHiring":55},{"title":319,"links":320},"热门链接",[321,325,329,333,337,341],{"url":322,"id":323,"title":324,"isHiring":55},"zh\u002Fevents\u002F","c3b02b79-cfab-4c6b-a321-601fb8aaf1ee","活动与网络研讨会",{"url":326,"id":327,"title":328,"isHiring":55},"zh\u002Fblog\u002F","dcf58b56-6c67-453a-bc46-7e7ca29d6ad3","Blog & News Center",{"url":330,"id":331,"title":332,"isHiring":55},"zh\u002Febooks-and-whitepapers\u002F","d3d9853d-e6b1-430f-ac93-4ca41062816b","电子书",{"url":334,"id":335,"title":336,"isHiring":55},"zh\u002Fproducts\u002Fservices\u002F","dbefe226-8948-4234-b3d7-11a39f15c293","MiR 服务",{"url":338,"id":339,"title":340,"isHiring":55},"zh\u002Fsafety-security-updates\u002Fsafety-and-security-updates","7d9c7a07-ee9a-49c0-bebd-b7154ff9b6fd","安全与保安问题更新",{"url":193,"id":187,"title":190,"isHiring":55},{"title":343,"links":344},"关于 MiR",[345,349,353,357,361],{"url":346,"id":347,"title":348,"isHiring":55},"zh\u002Fabout\u002Fmir-history","db8b5815-cd10-4a1e-8c4c-e44582042ff7","历史",{"url":350,"id":351,"title":352,"isHiring":55},"zh\u002Fabout\u002Fcareer\u002F","ebd55cc3-b451-4d9f-8389-68d7e889494d","职业生涯",{"url":354,"id":355,"title":356,"isHiring":55},"zh\u002Fabout\u002Fcareer\u002Fopen-vacancies","cf30dbd5-2a28-4323-9506-6702d228c4d6","职位空缺",{"url":358,"id":359,"title":360,"isHiring":55},"zh\u002Fabout\u002Fdata-notice","019744e9-c579-415c-8a15-8e47ce09debd","Data Notice",{"url":362,"id":363,"title":364,"isHiring":55},"zh\u002Fgeneral-terms-of-delivery\u002F","ddb7df97-6dcf-4e28-8c2e-40b20ab1256a","General Terms of Delivery",[366,369,372,375,378],{"title":367,"url":368},"linkedin","https:\u002F\u002Fwww.linkedin.com\u002Fcompany\u002Fmobile-industrial-robots-aps\u002F",{"title":370,"url":371},"facebook","https:\u002F\u002Fwww.facebook.com\u002FMiR.Robots",{"title":373,"url":374},"instagram","https:\u002F\u002Fwww.instagram.com\u002Fmobileindustrialrobots\u002F",{"title":376,"url":377},"twitter","https:\u002F\u002Ftwitter.com\u002FMobileIndRobots",{"title":379,"url":380},"youtube","https:\u002F\u002Fwww.youtube.com\u002Fchannel\u002FUC3MRxsNU6AW_hKdExtnGr1Q",[382],{"title":383,"url":384},"wechat","https:\u002F\u002Fmp.weixin.qq.com\u002Fs\u002FzlJVpVC40VBQJBAkUSh-0w",[386],{"url":387,"_uid":396,"title":397,"linkType":398,"component":398},{"id":388,"url":28,"linktype":110,"fieldtype":111,"cached_url":389,"prep":45,"story":390},"f89e458e-6860-4b96-b02e-c462d21ef0a1","\u002Fzh\u002Fabout\u002Fprivacy-policy\u002F",{"name":391,"id":392,"uuid":388,"slug":393,"url":394,"full_slug":395,"_stopResolving":45},"Privacy Policy",389640641,"privacy-policy","about\u002Fprivacy-policy\u002F","zh\u002Fabout\u002Fprivacy-policy\u002F","67e85086-82cb-485d-80ed-2abef92cc742","隐私政策","link",[400],{"url":401,"_uid":410,"title":411,"linkType":398,"component":398},{"id":402,"url":28,"linktype":110,"fieldtype":111,"cached_url":403,"prep":45,"story":404},"8181ff53-45dd-420c-b8f1-0de734d999ee","\u002Fzh\u002Fcookie-policy",{"name":405,"id":406,"uuid":402,"slug":407,"url":408,"full_slug":409,"_stopResolving":45},"Cookie Policy",356680705,"cookie-policy","about\u002Fcookie-policy","zh\u002Fabout\u002Fcookie-policy","aa639879-5d58-46b5-8c17-dcd35942475b","Cookie 政策",{"name":413,"created_at":414,"published_at":415,"updated_at":416,"id":417,"uuid":418,"content":419,"slug":413,"full_slug":423,"sort_by_date":64,"position":424,"tag_list":425,"is_startpage":55,"parent_id":281,"meta_data":64,"group_id":426,"first_published_at":427,"release_id":64,"lang":70,"path":64,"alternates":428,"default_full_slug":429,"translated_slugs":430},"language-switcher","2023-08-14T11:52:42.638Z","2024-03-26T11:26:07.197Z","2024-03-26T11:26:07.213Z",354358248,"f1d63013-0b69-4d61-a57f-08ffe45b982d",{"_uid":420,"headline":421,"component":413,"paragraph":422},"8a50d2d4-79a0-410b-9853-1dd743c4ede0","选择语言","选择不同的语言，mobile-industrial-robots.com 上的内容也可能发生变化。","zh\u002Fnavigation\u002Flanguage-switcher",-90,[],"d9fdd0a0-3d33-4b90-a4cd-e32ffdbaec82","2023-10-27T08:29:51.543Z",[],"navigation\u002Flanguage-switcher",[431,432,433,434,435,436,437,438,439,440,441],{"path":429,"name":64,"lang":75,"published":64},{"path":429,"name":64,"lang":77,"published":64},{"path":429,"name":64,"lang":79,"published":64},{"path":429,"name":64,"lang":81,"published":64},{"path":429,"name":64,"lang":83,"published":64},{"path":429,"name":64,"lang":85,"published":64},{"path":429,"name":64,"lang":87,"published":64},{"path":429,"name":64,"lang":70,"published":64},{"path":429,"name":64,"lang":90,"published":64},{"path":429,"name":64,"lang":92,"published":64},{"path":429,"name":64,"lang":94,"published":64},[443,479,515,550,585,620,654,690,726,760,795,829,864,899,933,967,1001,1035],{"name":444,"created_at":445,"published_at":446,"updated_at":447,"id":448,"uuid":449,"content":450,"slug":459,"full_slug":460,"sort_by_date":64,"position":461,"tag_list":462,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":463,"first_published_at":464,"release_id":64,"lang":70,"path":64,"alternates":465,"default_full_slug":466,"translated_slugs":467},"CVE-2025-13819: Open redirect","2025-12-01T08:29:01.589Z","2025-12-01T09:44:27.940Z","2025-12-01T09:44:27.960Z",118325827983691,"05926065-cfbb-49bc-8a22-1beb073adc1f",{"Keywords":28,"headline":444,"meta_fields":451,"lastModified":458,"firstPublished":458},[452],{"_uid":453,"title":454,"noIndex":55,"OG_image":455,"OG_title":454,"component":61,"description":457,"canonicalUrl":28,"OG_description":457},"45ff4bde-a7ed-44e1-992b-21226b8d4f90","Open redirect",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":456},{},"MiR robot and fleet software versions prior to version 3.7.0 are affected by an open redirect vulnerability. The web server accepts user-controlled input and uses it to redirect users to external sites without proper validation. This flaw enables crafting URLs that appear legitimate but redirect users to attacker-controlled sites, facilitating phishing and credential theft.","2025-12-01 00:00","cve-2025-13819-open-redirect","zh\u002Fsecurity-advisories\u002Fcve-2025-13819-open-redirect",-110,[],"1edcc0b9-91ba-41d5-920c-27a51d8d34bf","2025-12-01T09:38:38.843Z",[],"security-advisories\u002Fcve-2025-13819-open-redirect",[468,469,470,471,472,473,474,475,476,477,478],{"path":466,"name":64,"lang":75,"published":64},{"path":466,"name":64,"lang":77,"published":64},{"path":466,"name":64,"lang":79,"published":64},{"path":466,"name":64,"lang":81,"published":64},{"path":466,"name":64,"lang":83,"published":64},{"path":466,"name":64,"lang":85,"published":64},{"path":466,"name":64,"lang":87,"published":64},{"path":466,"name":64,"lang":70,"published":64},{"path":466,"name":64,"lang":90,"published":64},{"path":466,"name":64,"lang":92,"published":64},{"path":466,"name":64,"lang":94,"published":64},{"name":480,"created_at":481,"published_at":482,"updated_at":483,"id":484,"uuid":485,"content":486,"slug":496,"full_slug":497,"sort_by_date":64,"position":498,"tag_list":499,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":500,"first_published_at":482,"release_id":64,"lang":70,"path":64,"alternates":501,"default_full_slug":502,"translated_slugs":503},"CVE-2025-9229: Information Disclosure through verbose error pages","2025-09-02T11:34:58.033Z","2025-09-29T08:26:53.830Z","2025-09-29T08:26:53.855Z",86521028790762,"00ed0dcb-4750-4f4d-a346-441444c21c67",{"Keywords":28,"headline":487,"meta_fields":488,"lastModified":494,"firstPublished":495},"MSA-17: Information Disclosure",[489],{"_uid":490,"title":487,"noIndex":55,"OG_image":491,"OG_title":487,"component":61,"description":493,"canonicalUrl":28,"OG_description":493},"ed60ea18-67aa-4734-b1fb-22e738c89ae1",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":492},{},"MiR software versions prior to version 3.0.0 are affected by an information disclosure vulnerability. An unauthenticated attacker is able to view error pages which include unnecessarily detailed error information, such as file paths and other data. Such unnecessarily verbose information could potentially ease future exploitation attempts by attackers.","2025-09-24 00:00","2024-03-26 00:00","information-disclosure","zh\u002Fsecurity-advisories\u002Finformation-disclosure",0,[],"0e33737d-4f4d-41e0-bd92-19810ffdfe7d",[],"security-advisories\u002Finformation-disclosure",[504,505,506,507,508,509,510,511,512,513,514],{"path":502,"name":64,"lang":75,"published":64},{"path":502,"name":64,"lang":77,"published":64},{"path":502,"name":64,"lang":79,"published":64},{"path":502,"name":64,"lang":81,"published":64},{"path":502,"name":64,"lang":83,"published":64},{"path":502,"name":64,"lang":85,"published":64},{"path":502,"name":64,"lang":87,"published":64},{"path":502,"name":64,"lang":70,"published":64},{"path":502,"name":64,"lang":90,"published":64},{"path":502,"name":64,"lang":92,"published":64},{"path":502,"name":64,"lang":94,"published":64},{"name":516,"created_at":517,"published_at":518,"updated_at":519,"id":520,"uuid":521,"content":522,"slug":531,"full_slug":532,"sort_by_date":64,"position":533,"tag_list":534,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":535,"first_published_at":518,"release_id":64,"lang":70,"path":64,"alternates":536,"default_full_slug":537,"translated_slugs":538},"CVE-2025-8749: Path traversal","2025-09-04T14:22:29.160Z","2025-09-29T08:26:52.528Z","2025-09-29T08:26:52.552Z",87269986996075,"075f373d-29a0-4910-bdc6-b338f6f5d226",{"Keywords":28,"headline":523,"meta_fields":524,"lastModified":494,"firstPublished":530},"MSA-13: Path Traversal Vulnerability",[525],{"_uid":453,"title":526,"noIndex":55,"OG_image":527,"OG_title":526,"component":61,"description":529,"canonicalUrl":28,"OG_description":529},"Path Traversal",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":528},{},"MiR robot software versions prior to version 3.0.0 are affected by a path traversal vulnerability. Authenticated users could abuse a vulnerable API endpoint to extract files from the robot file system.","2024-03-19 00:00","path-traversal","zh\u002Fsecurity-advisories\u002Fpath-traversal",-100,[],"a8e212a8-0fe0-40b8-8e42-886e39f92801",[],"security-advisories\u002Fpath-traversal",[539,540,541,542,543,544,545,546,547,548,549],{"path":537,"name":64,"lang":75,"published":64},{"path":537,"name":64,"lang":77,"published":64},{"path":537,"name":64,"lang":79,"published":64},{"path":537,"name":64,"lang":81,"published":64},{"path":537,"name":64,"lang":83,"published":64},{"path":537,"name":64,"lang":85,"published":64},{"path":537,"name":64,"lang":87,"published":64},{"path":537,"name":64,"lang":70,"published":64},{"path":537,"name":64,"lang":90,"published":64},{"path":537,"name":64,"lang":92,"published":64},{"path":537,"name":64,"lang":94,"published":64},{"name":551,"created_at":552,"published_at":553,"updated_at":554,"id":555,"uuid":556,"content":557,"slug":566,"full_slug":567,"sort_by_date":64,"position":568,"tag_list":569,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":570,"first_published_at":553,"release_id":64,"lang":70,"path":64,"alternates":571,"default_full_slug":572,"translated_slugs":573},"CVE-2025-9225: Cross-site scripting","2025-09-04T14:13:22.814Z","2025-09-29T08:26:52.790Z","2025-09-29T08:26:52.818Z",87267749170629,"305fdaa0-1fd3-4633-ac20-7e5bcff08ecc",{"Keywords":28,"headline":558,"meta_fields":559,"lastModified":494,"firstPublished":530},"MSA-14: Cross-site scripting",[560],{"_uid":561,"title":562,"noIndex":55,"OG_image":563,"OG_title":562,"component":61,"description":565,"canonicalUrl":28,"OG_description":565},"8c0901e7-81b5-48b2-a39c-17b584fa5de5","Cross-site scripting",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":564},{},"MiR software versions prior to version 3.0.0 are affected by a stored cross-site scripting (XSS) vulnerability. If triggered by a logged in user, it could allow execution of arbitrary JavaScript code on a victim browser.","cross-site-scripting","zh\u002Fsecurity-advisories\u002Fcross-site-scripting",-80,[],"54a6d3e1-fcb3-4039-a0fd-a76fa41417e3",[],"security-advisories\u002Fcross-site-scripting",[574,575,576,577,578,579,580,581,582,583,584],{"path":572,"name":64,"lang":75,"published":64},{"path":572,"name":64,"lang":77,"published":64},{"path":572,"name":64,"lang":79,"published":64},{"path":572,"name":64,"lang":81,"published":64},{"path":572,"name":64,"lang":83,"published":64},{"path":572,"name":64,"lang":85,"published":64},{"path":572,"name":64,"lang":87,"published":64},{"path":572,"name":64,"lang":70,"published":64},{"path":572,"name":64,"lang":90,"published":64},{"path":572,"name":64,"lang":92,"published":64},{"path":572,"name":64,"lang":94,"published":64},{"name":586,"created_at":587,"published_at":588,"updated_at":589,"id":590,"uuid":591,"content":592,"slug":601,"full_slug":602,"sort_by_date":64,"position":603,"tag_list":604,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":605,"first_published_at":588,"release_id":64,"lang":70,"path":64,"alternates":606,"default_full_slug":607,"translated_slugs":608},"CVE-2025-9228: Insufficient authorization when creating notes","2025-09-04T14:04:48.632Z","2025-09-29T08:26:53.053Z","2025-09-29T08:26:53.084Z",87265643080581,"e9c368d5-2954-45b7-a2ba-36970a0ee022",{"Keywords":28,"headline":593,"meta_fields":594,"lastModified":494,"firstPublished":530},"MSA-15: Insufficient authorization when creating notes",[595],{"_uid":596,"title":597,"noIndex":55,"OG_image":598,"OG_title":597,"component":61,"description":600,"canonicalUrl":28,"OG_description":600},"2bcd69f1-d60f-47c2-b86f-effae565b9dd","Insufficient authorization when creating notes",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":599},{},"MiR software versions prior to version 3.0.0 have insufficient authorization controls when creating text notes, allowing low-privilege users to create notes which are intended only for administrative users.","insufficient-authorization-when-creating-notes","zh\u002Fsecurity-advisories\u002Finsufficient-authorization-when-creating-notes",-60,[],"1fb820e5-32ab-465c-ba6c-5445489bda8c",[],"security-advisories\u002Finsufficient-authorization-when-creating-notes",[609,610,611,612,613,614,615,616,617,618,619],{"path":607,"name":64,"lang":75,"published":64},{"path":607,"name":64,"lang":77,"published":64},{"path":607,"name":64,"lang":79,"published":64},{"path":607,"name":64,"lang":81,"published":64},{"path":607,"name":64,"lang":83,"published":64},{"path":607,"name":64,"lang":85,"published":64},{"path":607,"name":64,"lang":87,"published":64},{"path":607,"name":64,"lang":70,"published":64},{"path":607,"name":64,"lang":90,"published":64},{"path":607,"name":64,"lang":92,"published":64},{"path":607,"name":64,"lang":94,"published":64},{"name":621,"created_at":622,"published_at":623,"updated_at":624,"id":625,"uuid":626,"content":627,"slug":635,"full_slug":636,"sort_by_date":64,"position":637,"tag_list":638,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":639,"first_published_at":623,"release_id":64,"lang":70,"path":64,"alternates":640,"default_full_slug":641,"translated_slugs":642},"CVE-2025-8748: Command injection","2025-09-04T13:56:38.486Z","2025-09-29T08:26:53.305Z","2025-09-29T08:26:53.333Z",87263635449991,"f54092b8-4cf9-4f69-9ea1-f2da5d8499ef",{"Keywords":28,"headline":628,"meta_fields":629,"lastModified":494,"firstPublished":530},"MSA-16: Command injection",[630],{"_uid":631,"title":628,"noIndex":55,"OG_image":632,"OG_title":628,"component":61,"description":634,"canonicalUrl":28,"OG_description":634},"253d8802-7aca-4090-940c-1b8d575b88eb",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":633},{},"MiR software versions prior to version 3.0.0 are affected by a command injection vulnerability. A malicious HTTP request crafted by an authenticated user could allow the execution of arbitrary commands on the underlying operating system.","command-injection","zh\u002Fsecurity-advisories\u002Fcommand-injection",-40,[],"17a5a2eb-5bc0-4cec-8050-2d12ba023824",[],"security-advisories\u002Fcommand-injection",[643,644,645,646,647,648,649,650,651,652,653],{"path":641,"name":64,"lang":75,"published":64},{"path":641,"name":64,"lang":77,"published":64},{"path":641,"name":64,"lang":79,"published":64},{"path":641,"name":64,"lang":81,"published":64},{"path":641,"name":64,"lang":83,"published":64},{"path":641,"name":64,"lang":85,"published":64},{"path":641,"name":64,"lang":87,"published":64},{"path":641,"name":64,"lang":70,"published":64},{"path":641,"name":64,"lang":90,"published":64},{"path":641,"name":64,"lang":92,"published":64},{"path":641,"name":64,"lang":94,"published":64},{"name":655,"created_at":656,"published_at":657,"updated_at":658,"id":659,"uuid":660,"content":661,"slug":671,"full_slug":672,"sort_by_date":64,"position":673,"tag_list":674,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":675,"first_published_at":657,"release_id":64,"lang":70,"path":64,"alternates":676,"default_full_slug":677,"translated_slugs":678},"CVE-2021-44228: Log4Shell ","2025-09-04T14:27:38.432Z","2025-09-29T08:26:52.277Z","2025-09-29T08:26:52.304Z",87271253787325,"d06f143a-da8a-4315-8c20-6860ddebfbeb",{"Keywords":28,"headline":662,"meta_fields":663,"lastModified":494,"firstPublished":670},"PSA-012: Log4shell",[664],{"_uid":665,"title":666,"noIndex":55,"OG_image":667,"OG_title":666,"component":61,"description":669,"canonicalUrl":28,"OG_description":669},"b1cd31ff-d148-4545-8df5-7e236bb5d6f9","Log4Shell (CVE-2021-44228)",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":668},{},"We hereby inform that MiR products are not affected by the Apache Log4j vulnerability known as Log4Shell.","2021-12-21 00:00","log4shell","zh\u002Fsecurity-advisories\u002Flog4shell",-150,[],"4408cf8b-5b8e-4558-9c5f-349dea1b5afe",[],"security-advisories\u002Flog4shell",[679,680,681,682,683,684,685,686,687,688,689],{"path":677,"name":64,"lang":75,"published":64},{"path":677,"name":64,"lang":77,"published":64},{"path":677,"name":64,"lang":79,"published":64},{"path":677,"name":64,"lang":81,"published":64},{"path":677,"name":64,"lang":83,"published":64},{"path":677,"name":64,"lang":85,"published":64},{"path":677,"name":64,"lang":87,"published":64},{"path":677,"name":64,"lang":70,"published":64},{"path":677,"name":64,"lang":90,"published":64},{"path":677,"name":64,"lang":92,"published":64},{"path":677,"name":64,"lang":94,"published":64},{"name":691,"created_at":692,"published_at":693,"updated_at":694,"id":695,"uuid":696,"content":697,"slug":707,"full_slug":708,"sort_by_date":64,"position":709,"tag_list":710,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":711,"first_published_at":693,"release_id":64,"lang":70,"path":64,"alternates":712,"default_full_slug":713,"translated_slugs":714},"CVE-2017-7184, CVE-2017-18255: Local Attacker can Exploit Kernel Vulnerabilities","2025-09-04T15:42:08.655Z","2025-09-29T08:26:50.158Z","2025-09-29T08:26:50.188Z",87289563822831,"07647f34-e618-4ae7-b22d-40b140d33e88",{"Keywords":28,"headline":698,"meta_fields":699,"lastModified":494,"firstPublished":706},"PSA-001: Local Attacker can exploit kernel vulnerabilities",[700],{"_uid":701,"title":702,"noIndex":55,"OG_image":703,"OG_title":702,"component":61,"description":705,"canonicalUrl":28,"OG_description":705},"d90fae0d-877b-4891-8d4f-a7473735657a","CVE-2017-7184, CVE-2017-18255",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":704},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.\n","2021-05-27 00:00","cve-2017-7184-cve-2017-18255","zh\u002Fsecurity-advisories\u002Fcve-2017-7184-cve-2017-18255",-350,[],"dac73eee-3759-4ad9-8cea-a594d455287a",[],"security-advisories\u002Fcve-2017-7184-cve-2017-18255",[715,716,717,718,719,720,721,722,723,724,725],{"path":713,"name":64,"lang":75,"published":64},{"path":713,"name":64,"lang":77,"published":64},{"path":713,"name":64,"lang":79,"published":64},{"path":713,"name":64,"lang":81,"published":64},{"path":713,"name":64,"lang":83,"published":64},{"path":713,"name":64,"lang":85,"published":64},{"path":713,"name":64,"lang":87,"published":64},{"path":713,"name":64,"lang":70,"published":64},{"path":713,"name":64,"lang":90,"published":64},{"path":713,"name":64,"lang":92,"published":64},{"path":713,"name":64,"lang":94,"published":64},{"name":727,"created_at":728,"published_at":729,"updated_at":730,"id":731,"uuid":732,"content":733,"slug":741,"full_slug":742,"sort_by_date":64,"position":743,"tag_list":744,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":745,"first_published_at":729,"release_id":64,"lang":70,"path":64,"alternates":746,"default_full_slug":747,"translated_slugs":748},"CVE-2020-10269: Default Passwords for Wireless Access Points","2025-09-04T15:36:44.924Z","2025-09-29T08:26:50.531Z","2025-09-29T08:26:50.563Z",87288237800873,"0240d937-d72f-4457-bfeb-dd7694f51cc7",{"Keywords":28,"headline":734,"meta_fields":735,"lastModified":494,"firstPublished":706},"PSA-002: Default Passwords for Wireless Access Points",[736],{"_uid":737,"title":738,"noIndex":55,"OG_image":739,"OG_title":738,"component":61,"description":705,"canonicalUrl":28,"OG_description":705},"8b5a9265-3b74-45a7-ab27-12d3a31f5ef4","CVE-2020-10269",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":740},{},"cve-2020-10269","zh\u002Fsecurity-advisories\u002Fcve-2020-10269",-330,[],"d02707b3-5193-457b-b9bd-42c50d595cda",[],"security-advisories\u002Fcve-2020-10269",[749,750,751,752,753,754,755,756,757,758,759],{"path":747,"name":64,"lang":75,"published":64},{"path":747,"name":64,"lang":77,"published":64},{"path":747,"name":64,"lang":79,"published":64},{"path":747,"name":64,"lang":81,"published":64},{"path":747,"name":64,"lang":83,"published":64},{"path":747,"name":64,"lang":85,"published":64},{"path":747,"name":64,"lang":87,"published":64},{"path":747,"name":64,"lang":70,"published":64},{"path":747,"name":64,"lang":90,"published":64},{"path":747,"name":64,"lang":92,"published":64},{"path":747,"name":64,"lang":94,"published":64},{"name":761,"created_at":762,"published_at":763,"updated_at":764,"id":765,"uuid":766,"content":767,"slug":776,"full_slug":777,"sort_by_date":64,"position":778,"tag_list":779,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":780,"first_published_at":763,"release_id":64,"lang":70,"path":64,"alternates":781,"default_full_slug":782,"translated_slugs":783},"CVE-2020-10270: Predefined Credentials for the web Interface","2025-09-04T15:31:57.471Z","2025-09-29T08:26:50.535Z","2025-09-29T08:26:50.562Z",87287060407812,"a1fc16dd-3ada-4329-914d-7f47ab76c60c",{"Keywords":28,"headline":768,"meta_fields":769,"lastModified":494,"firstPublished":706},"PSA-003: Predefined Credentials for the web Interface",[770],{"_uid":771,"title":772,"noIndex":55,"OG_image":773,"OG_title":772,"component":61,"description":775,"canonicalUrl":28,"OG_description":775},"d963aa77-a9bc-4ccb-b3e8-117c45baed23","CVE-2020-10270",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":774},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated","cve-2020-10270","zh\u002Fsecurity-advisories\u002Fcve-2020-10270",-310,[],"088b7eb4-e8f5-4115-997a-504449347f13",[],"security-advisories\u002Fcve-2020-10270",[784,785,786,787,788,789,790,791,792,793,794],{"path":782,"name":64,"lang":75,"published":64},{"path":782,"name":64,"lang":77,"published":64},{"path":782,"name":64,"lang":79,"published":64},{"path":782,"name":64,"lang":81,"published":64},{"path":782,"name":64,"lang":83,"published":64},{"path":782,"name":64,"lang":85,"published":64},{"path":782,"name":64,"lang":87,"published":64},{"path":782,"name":64,"lang":70,"published":64},{"path":782,"name":64,"lang":90,"published":64},{"path":782,"name":64,"lang":92,"published":64},{"path":782,"name":64,"lang":94,"published":64},{"name":796,"created_at":797,"published_at":798,"updated_at":799,"id":800,"uuid":801,"content":802,"slug":810,"full_slug":811,"sort_by_date":64,"position":812,"tag_list":813,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":814,"first_published_at":798,"release_id":64,"lang":70,"path":64,"alternates":815,"default_full_slug":816,"translated_slugs":817},"CVE-2020-10271, CVE-2020-10272: Interfaces Accessible without Authentication","2025-09-04T15:25:52.944Z","2025-09-29T08:26:50.610Z","2025-09-29T08:26:50.634Z",87285567297890,"bd6cd51a-53c3-4f5b-89ff-824d63a4d711",{"Keywords":28,"headline":803,"meta_fields":804,"lastModified":494,"firstPublished":706},"PSA-004: Interfaces Accessible without Authentication",[805],{"_uid":806,"title":807,"noIndex":55,"OG_image":808,"OG_title":807,"component":61,"description":705,"canonicalUrl":28,"OG_description":705},"3ffe6c41-44f1-477b-b146-03157b52d736","CVE-2020-10271, CVE-2020-10272",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":809},{},"cve-2020-10271-cve-2020-10272","zh\u002Fsecurity-advisories\u002Fcve-2020-10271-cve-2020-10272",-290,[],"6f3f6966-5508-4226-835e-0ec4b9fbf0ee",[],"security-advisories\u002Fcve-2020-10271-cve-2020-10272",[818,819,820,821,822,823,824,825,826,827,828],{"path":816,"name":64,"lang":75,"published":64},{"path":816,"name":64,"lang":77,"published":64},{"path":816,"name":64,"lang":79,"published":64},{"path":816,"name":64,"lang":81,"published":64},{"path":816,"name":64,"lang":83,"published":64},{"path":816,"name":64,"lang":85,"published":64},{"path":816,"name":64,"lang":87,"published":64},{"path":816,"name":64,"lang":70,"published":64},{"path":816,"name":64,"lang":90,"published":64},{"path":816,"name":64,"lang":92,"published":64},{"path":816,"name":64,"lang":94,"published":64},{"name":830,"created_at":831,"published_at":832,"updated_at":833,"id":834,"uuid":835,"content":836,"slug":845,"full_slug":846,"sort_by_date":64,"position":847,"tag_list":848,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":849,"first_published_at":832,"release_id":64,"lang":70,"path":64,"alternates":850,"default_full_slug":851,"translated_slugs":852},"CVE-2020-10273: No Encryption on Artifacts","2025-09-04T15:20:32.154Z","2025-09-29T08:26:50.763Z","2025-09-29T08:26:50.791Z",87284253352545,"b14fc38b-2515-4f59-8ab0-c8ca3faf32ab",{"Keywords":28,"headline":837,"meta_fields":838,"lastModified":494,"firstPublished":706},"PSA-005: No Encryption on Artifacts",[839],{"_uid":840,"title":841,"noIndex":55,"OG_image":842,"OG_title":841,"component":61,"description":844,"canonicalUrl":28,"OG_description":844},"1b868317-3375-42db-9de6-525d6e5136b5","CVE-2020-10273",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":843},{},"This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.","cve-2020-10273","zh\u002Fsecurity-advisories\u002Fcve-2020-10273",-270,[],"68b5c944-a4b8-4099-9167-f0504c549502",[],"security-advisories\u002Fcve-2020-10273",[853,854,855,856,857,858,859,860,861,862,863],{"path":851,"name":64,"lang":75,"published":64},{"path":851,"name":64,"lang":77,"published":64},{"path":851,"name":64,"lang":79,"published":64},{"path":851,"name":64,"lang":81,"published":64},{"path":851,"name":64,"lang":83,"published":64},{"path":851,"name":64,"lang":85,"published":64},{"path":851,"name":64,"lang":87,"published":64},{"path":851,"name":64,"lang":70,"published":64},{"path":851,"name":64,"lang":90,"published":64},{"path":851,"name":64,"lang":92,"published":64},{"path":851,"name":64,"lang":94,"published":64},{"name":865,"created_at":866,"published_at":867,"updated_at":868,"id":869,"uuid":870,"content":871,"slug":880,"full_slug":881,"sort_by_date":64,"position":882,"tag_list":883,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":884,"first_published_at":867,"release_id":64,"lang":70,"path":64,"alternates":885,"default_full_slug":886,"translated_slugs":887},"CVE-2020-10274, CVE-2020-10275: API Vulnerable via default Web Credentials","2025-09-04T15:10:52.631Z","2025-09-29T08:26:51.028Z","2025-09-29T08:26:51.058Z",87281879618643,"70648d51-4aa9-4458-a569-34d61dd4385e",{"Keywords":28,"headline":872,"meta_fields":873,"lastModified":494,"firstPublished":706},"PSA-006: API Vulnerable via default Web Credentials",[874],{"_uid":875,"title":876,"noIndex":55,"OG_image":877,"OG_title":876,"component":61,"description":879,"canonicalUrl":28,"OG_description":879},"5d7ae8c9-9dfe-4395-93bd-5ada01c0bb48","CVE-2020-10274, CVE-2020-10275",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":878},{},"MiR robots offer a REST-like API to interact with the robot in an automated way, for scenarios where\nmanual use of the web interface is not desired. This API requires authentication using a key derived\nfrom user credentials for the web interface.","cve-2020-10274-cve-2020-10275","zh\u002Fsecurity-advisories\u002Fcve-2020-10274-cve-2020-10275",-250,[],"0e119a1a-b240-43e6-a018-68af6e0fdab0",[],"security-advisories\u002Fcve-2020-10274-cve-2020-10275",[888,889,890,891,892,893,894,895,896,897,898],{"path":886,"name":64,"lang":75,"published":64},{"path":886,"name":64,"lang":77,"published":64},{"path":886,"name":64,"lang":79,"published":64},{"path":886,"name":64,"lang":81,"published":64},{"path":886,"name":64,"lang":83,"published":64},{"path":886,"name":64,"lang":85,"published":64},{"path":886,"name":64,"lang":87,"published":64},{"path":886,"name":64,"lang":70,"published":64},{"path":886,"name":64,"lang":90,"published":64},{"path":886,"name":64,"lang":92,"published":64},{"path":886,"name":64,"lang":94,"published":64},{"name":900,"created_at":901,"published_at":902,"updated_at":903,"id":904,"uuid":905,"content":906,"slug":914,"full_slug":915,"sort_by_date":64,"position":916,"tag_list":917,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":918,"first_published_at":902,"release_id":64,"lang":70,"path":64,"alternates":919,"default_full_slug":920,"translated_slugs":921},"CVE-2020-10276: Default Passwords for safety PLC","2025-09-04T15:06:07.725Z","2025-09-29T08:26:51.269Z","2025-09-29T08:26:51.292Z",87280712652319,"1ab79a74-b6b8-418c-b215-a7ecfd064e25",{"Keywords":28,"headline":907,"meta_fields":908,"lastModified":494,"firstPublished":706},"PSA-007: Default Passwords for safety PLC",[909],{"_uid":910,"title":911,"noIndex":55,"OG_image":912,"OG_title":911,"component":61,"description":844,"canonicalUrl":28,"OG_description":844},"22171815-092c-4fe7-9b28-3b86d3773bbb","CVE-2020-10276",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":913},{},"cve-2020-10276","zh\u002Fsecurity-advisories\u002Fcve-2020-10276",-230,[],"daf7ef0a-7acd-4848-8481-9d8dd9b01cf2",[],"security-advisories\u002Fcve-2020-10276",[922,923,924,925,926,927,928,929,930,931,932],{"path":920,"name":64,"lang":75,"published":64},{"path":920,"name":64,"lang":77,"published":64},{"path":920,"name":64,"lang":79,"published":64},{"path":920,"name":64,"lang":81,"published":64},{"path":920,"name":64,"lang":83,"published":64},{"path":920,"name":64,"lang":85,"published":64},{"path":920,"name":64,"lang":87,"published":64},{"path":920,"name":64,"lang":70,"published":64},{"path":920,"name":64,"lang":90,"published":64},{"path":920,"name":64,"lang":92,"published":64},{"path":920,"name":64,"lang":94,"published":64},{"name":934,"created_at":935,"published_at":936,"updated_at":937,"id":938,"uuid":939,"content":940,"slug":948,"full_slug":949,"sort_by_date":64,"position":950,"tag_list":951,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":952,"first_published_at":936,"release_id":64,"lang":70,"path":64,"alternates":953,"default_full_slug":954,"translated_slugs":955},"CVE-2020-10277: Boot from a connected USB drive.","2025-09-04T15:00:44.786Z","2025-09-29T08:26:51.533Z","2025-09-29T08:26:51.560Z",87279389887398,"6816b8b9-c123-4088-9e5e-976b8ff48b07",{"Keywords":28,"headline":941,"meta_fields":942,"lastModified":494,"firstPublished":706},"PSA-008: Boot from a connected USB drive.",[943],{"_uid":944,"title":945,"noIndex":55,"OG_image":946,"OG_title":945,"component":61,"description":705,"canonicalUrl":28,"OG_description":705},"4e486641-499f-413c-8247-2074f2bccd17","CVE-2020-10277",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":947},{},"cve-2020-10277","zh\u002Fsecurity-advisories\u002Fcve-2020-10277",-210,[],"a8a870ed-cb42-4b04-898e-5ebb3e7f83cb",[],"security-advisories\u002Fcve-2020-10277",[956,957,958,959,960,961,962,963,964,965,966],{"path":954,"name":64,"lang":75,"published":64},{"path":954,"name":64,"lang":77,"published":64},{"path":954,"name":64,"lang":79,"published":64},{"path":954,"name":64,"lang":81,"published":64},{"path":954,"name":64,"lang":83,"published":64},{"path":954,"name":64,"lang":85,"published":64},{"path":954,"name":64,"lang":87,"published":64},{"path":954,"name":64,"lang":70,"published":64},{"path":954,"name":64,"lang":90,"published":64},{"path":954,"name":64,"lang":92,"published":64},{"path":954,"name":64,"lang":94,"published":64},{"name":968,"created_at":969,"published_at":970,"updated_at":971,"id":972,"uuid":973,"content":974,"slug":982,"full_slug":983,"sort_by_date":64,"position":984,"tag_list":985,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":986,"first_published_at":970,"release_id":64,"lang":70,"path":64,"alternates":987,"default_full_slug":988,"translated_slugs":989},"CVE-2020-10278: No Password Configured for the BIOS","2025-09-04T14:52:31.451Z","2025-09-29T08:26:51.773Z","2025-09-29T08:26:51.798Z",87277369192918,"4799ccc7-297d-465c-a35e-33eba8ad705e",{"Keywords":28,"headline":975,"meta_fields":976,"lastModified":494,"firstPublished":706},"PSA-009: No Password Configured for the BIOS",[977],{"_uid":978,"title":979,"noIndex":55,"OG_image":980,"OG_title":979,"component":61,"description":705,"canonicalUrl":28,"OG_description":705},"3db78651-b53e-4d38-accb-c0fe801b2d78","CVE-2020-10278",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":981},{},"cve-2020-10278","zh\u002Fsecurity-advisories\u002Fcve-2020-10278",-190,[],"9b7e110e-33ea-48d1-8833-c22feebdc247",[],"security-advisories\u002Fcve-2020-10278",[990,991,992,993,994,995,996,997,998,999,1000],{"path":988,"name":64,"lang":75,"published":64},{"path":988,"name":64,"lang":77,"published":64},{"path":988,"name":64,"lang":79,"published":64},{"path":988,"name":64,"lang":81,"published":64},{"path":988,"name":64,"lang":83,"published":64},{"path":988,"name":64,"lang":85,"published":64},{"path":988,"name":64,"lang":87,"published":64},{"path":988,"name":64,"lang":70,"published":64},{"path":988,"name":64,"lang":90,"published":64},{"path":988,"name":64,"lang":92,"published":64},{"path":988,"name":64,"lang":94,"published":64},{"name":1002,"created_at":1003,"published_at":1004,"updated_at":1005,"id":1006,"uuid":1007,"content":1008,"slug":1016,"full_slug":1017,"sort_by_date":64,"position":1018,"tag_list":1019,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":1020,"first_published_at":1004,"release_id":64,"lang":70,"path":64,"alternates":1021,"default_full_slug":1022,"translated_slugs":1023},"CVE-2020-10279: Insecure Defaults for Robots","2025-09-04T14:40:35.095Z","2025-09-29T08:26:52.022Z","2025-09-29T08:26:52.046Z",87274434997495,"0bc3351e-398a-4a02-9346-d37a84e47b37",{"Keywords":28,"headline":1009,"meta_fields":1010,"lastModified":494,"firstPublished":706},"PSA-010: Insecure Defaults for Robots",[1011],{"_uid":1012,"title":1013,"noIndex":55,"OG_image":1014,"OG_title":1013,"component":61,"description":844,"canonicalUrl":28,"OG_description":844},"fdaf6bb0-ef8e-44d3-928a-6ab1ffacd4ed","CVE-2020-10279",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":1015},{},"cve-2020-10279","zh\u002Fsecurity-advisories\u002Fcve-2020-10279",-170,[],"877ccead-df31-49e3-a803-5bb1abad6086",[],"security-advisories\u002Fcve-2020-10279",[1024,1025,1026,1027,1028,1029,1030,1031,1032,1033,1034],{"path":1022,"name":64,"lang":75,"published":64},{"path":1022,"name":64,"lang":77,"published":64},{"path":1022,"name":64,"lang":79,"published":64},{"path":1022,"name":64,"lang":81,"published":64},{"path":1022,"name":64,"lang":83,"published":64},{"path":1022,"name":64,"lang":85,"published":64},{"path":1022,"name":64,"lang":87,"published":64},{"path":1022,"name":64,"lang":70,"published":64},{"path":1022,"name":64,"lang":90,"published":64},{"path":1022,"name":64,"lang":92,"published":64},{"path":1022,"name":64,"lang":94,"published":64},{"name":1036,"created_at":1037,"published_at":1038,"updated_at":1039,"id":1040,"uuid":1041,"content":1042,"slug":1050,"full_slug":1051,"sort_by_date":64,"position":1052,"tag_list":1053,"is_startpage":55,"parent_id":67,"meta_data":64,"group_id":1054,"first_published_at":1038,"release_id":64,"lang":70,"path":64,"alternates":1055,"default_full_slug":1056,"translated_slugs":1057},"CVE-2020-10280: DOS on Web Interface","2025-09-02T12:25:11.512Z","2025-09-29T08:26:53.592Z","2025-09-29T08:26:53.622Z",86533372000410,"d962353a-639e-4e3d-8ff8-70ee48213d4b",{"Keywords":28,"headline":1043,"meta_fields":1044,"lastModified":494,"firstPublished":706},"PSA-011: DOS on Web Interface",[1045],{"_uid":1046,"title":1047,"noIndex":55,"OG_image":1048,"OG_title":1047,"component":61,"description":844,"canonicalUrl":28,"OG_description":844},"de0c5902-fa21-4a6a-bfc5-3f2a1b940a7a","CVE-2020-10280",{"id":64,"alt":64,"name":28,"focus":64,"title":64,"source":64,"filename":28,"copyright":64,"fieldtype":59,"meta_data":1049},{},"cve-2020-10280","zh\u002Fsecurity-advisories\u002Fcve-2020-10280",-20,[],"ec6e901b-7bf3-49af-820f-1e0025cc907a",[],"security-advisories\u002Fcve-2020-10280",[1058,1059,1060,1061,1062,1063,1064,1065,1066,1067,1068],{"path":1056,"name":64,"lang":75,"published":64},{"path":1056,"name":64,"lang":77,"published":64},{"path":1056,"name":64,"lang":79,"published":64},{"path":1056,"name":64,"lang":81,"published":64},{"path":1056,"name":64,"lang":83,"published":64},{"path":1056,"name":64,"lang":85,"published":64},{"path":1056,"name":64,"lang":87,"published":64},{"path":1056,"name":64,"lang":70,"published":64},{"path":1056,"name":64,"lang":90,"published":64},{"path":1056,"name":64,"lang":92,"published":64},{"path":1056,"name":64,"lang":94,"published":64}]