./about_me.sh
I'm Kevin Schaller, based in Heidelberg, Germany. With 15 years in the field, I've actively shaped the IoT security landscape from local to global scale. Whether I'm auditing architectures, reverse engineering, or breaking things in offensive security, my goal is to secure the ecosystem and making the world a safer place. I also pass on this mindset as a university lecturer and through hands-on workshops.
cat /var/log/cve_discoveries.log
▶
CVE-2025-59787
AXIS/2N Improper Handling of Exceptional Conditions leads to Information Disclosure via HTTP 500 Errors
Medium
2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts.
▶
CVE-2025-59786
AXIS/2N Insufficient Session Expiration allows Session Cookies to Remain Active after Logout
Medium
2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.
▶
CVE-2025-59785
AXIS/2N Insufficient Input Validation on API Endpoint allows Bypass of Backup Encryption Password Policy
Medium
Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges.
▶
CVE-2025-59784
AXIS/2N Log Pollution via Unsanitised API Parameters
Medium
2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation. This vulnerability can only be exploited after authenticating with administrator privileges.
▶
CVE-2025-59783
AXIS/2N Authenticated OS Command Injection via API Endpoint for User Synchronization
High
API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges.
▶
CVE-2025-12603
Azure Access BLU-IC Arbitrary Write to Timezone Configuration
Low
/etc/timezone can be Arbitrarily Written.
▶
CVE-2025-12602
Azure Access BLU-IC Arbitrary Write to Avahi Service Configuration
Low
/etc/avahi/services/z9.service can be Arbitrarily Written.
▶
CVE-2025-12601
Azure Access BLU-IC Denial of Service via SlowLoris Attack
Critical
Denial of Service Due to SlowLoris.
▶
CVE-2025-12600
Azure Access BLU-IC Web UI Malfunction via Unexpected Locale Setting
Critical
Web UI Malfunction when setting unexpected locale via API.
▶
CVE-2025-12599
Azure Access BLU-IC Shared Secrets for SDKSocket across Multiple Devices
Critical
Multiple Devices are Sharing the Same Secrets for SDKSocket (TCP/5000).
▶
CVE-2025-12554
Azure Access BLU-IC CVE-2025-12554
Medium
CVE-2025-12554. Details pending publication on NVD.
▶
CVE-2025-12553
Azure Access BLU-IC Email Server Certificate Verification Disabled
Critical
Email Server Certificate Verification Disabled.
▶
CVE-2025-12552
Azure Access BLU-IC CVE-2025-12552
Medium
CVE-2025-12552. Details pending publication on NVD.
▶
CVE-2025-12517
Azure Access BLU-IC Credits Page Not Matching Firmware Component Versions
Low
Credits Page not Matching Versions in Use in the Firmware.
▶
CVE-2025-12516
Azure Access BLU-IC Lack of Graceful Error Handling via HTTP 5xx Errors
Critical
Lack of Graceful Error Handling - HTTP 5xx Error.
▶
CVE-2025-12515
Azure Access BLU-IC Systemic Internal Server Errors via HTTP 500 Response
Critical
Systemic Internal Server Errors - HTTP 500 Response.
▶
CVE-2025-12479
Azure Access BLU-IC Missing Cross-Site Request Forgery (CSRF) Token Implementation
Critical
Systemic Lack of Cross-Site Request Forgery (CSRF) Token Implementation.
▶
CVE-2025-12478
Azure Access BLU-IC Non-Compliant TLS Configuration
Critical
Non-Compliant TLS Configuration.
▶
CVE-2025-12477
Azure Access BLU-IC CVE-2025-12477
Critical
CVE-2025-12477. Details pending publication on NVD.
▶
CVE-2025-12476
Azure Access BLU-IC CVE-2025-12476
Critical
CVE-2025-12476. Details pending publication on NVD.
▶
CVE-2025-12425
Azure Access BLU-IC CVE-2025-12425
Critical
CVE-2025-12425. Details pending publication on NVD.
▶
CVE-2025-12424
Azure Access BLU-IC Privilege Escalation through SUID-bit Binary
Critical
Privilege Escalation through SUID-bit Binary.
▶
CVE-2025-12423
Azure Access BLU-IC Protocol Manipulation Leads to Denial of Service
Critical
Protocol manipulation might lead to denial of service.
▶
CVE-2025-12422
Azure Access BLU-IC Vulnerable Upgrade Feature Allows Arbitrary File Write
Critical
Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.
▶
CVE-2025-12365
Azure Access BLU-IC Error Messages Wrapped in HTTP Header
Medium
Error Messages Wrapped In HTTP Header.
▶
CVE-2025-12364
Azure Access BLU-IC CVE-2025-12364
Critical
CVE-2025-12364. Details pending publication on NVD.
▶
CVE-2025-12363
Azure Access BLU-IC CVE-2025-12363
Critical
CVE-2025-12363. Details pending publication on NVD.
▶
CVE-2025-12285
Azure Access BLU-IC CVE-2025-12285
Critical
CVE-2025-12285. Details pending publication on NVD.
▶
CVE-2025-12284
Azure Access BLU-IC CVE-2025-12284
Medium
CVE-2025-12284. Details pending publication on NVD.
▶
CVE-2025-12278
Azure Access BLU-IC CVE-2025-12278
Medium
CVE-2025-12278. Details pending publication on NVD.
▶
CVE-2025-12275
Azure Access BLU-IC Mail Configuration File Manipulation and Command Execution
Critical
Mail Configuration File Manipulation + Command Execution.
▶
CVE-2025-12221
Azure Access BLU-IC Busybox 1.31.1 Multiple Known Vulnerabilities (Configuration)
Low
Busybox 1.31.1 - Multiple Known Vulnerabilities.
▶
CVE-2025-12220
Azure Access BLU-IC Busybox 1.31.1 Multiple Known Vulnerabilities
Critical
Busybox 1.31.1 - Multiple Known Vulnerabilities.
▶
CVE-2025-12219
Azure Access BLU-IC Vulnerable Components in Azure Access OS
Critical
Vulnerable Components in Azure Access OS.
▶
CVE-2025-12218
Azure Access BLU-IC CVE-2025-12218
Critical
CVE-2025-12218. Details pending publication on NVD.
▶
CVE-2025-12217
Azure Access BLU-IC SNMP Default Community String
Medium
SNMP Default Community String (public).
▶
CVE-2025-12216
Azure Access BLU-IC Malicious App Installation without Uninstall Capability
Critical
Malicious / Malformed App can be Installed but not Uninstalled/may lead to unavailability.
▶
CVE-2025-12176
Azure Access BLU-IC Undocumented Administrative Accounts
Critical
Undocumented administrative accounts were getting created to facilitate access for applications running on board.
▶
CVE-2025-12114
Azure Access BLU-IC Serial Console Information Leakage
Medium
Enabled serial console could potentially leak information that might help attacker to find vulnerabilities.
▶
CVE-2025-12104
Azure Access BLU-IC Outdated and Vulnerable UI Dependencies
Critical
Outdated and Vulnerable UI Dependencies might potentially lead to exploitation.
▶
CVE-2025-12031
Azure Access BLU-IC HTTP Security Misconfiguration - Missing Secure and HTTPOnly Cookie Attributes
Medium
HTTP Security Misconfiguration - Lacking Secure and HTTPOnly Attribute may allow reading the sensitive cookies from the javascript context.
▶
CVE-2025-12001
Azure Access BLU-IC CVE-2025-12001
Critical
CVE-2025-12001. Details pending publication on NVD.
▶
CVE-2025-11925
Azure Access BLU-IC Incorrect Content-Type Header Allows HTML/JavaScript Injection
Critical
Incorrect Content-Type header in one of the APIs (text/html instead of application/json) replies may potentially allow injection of HTML/JavaScript into reply.
▶
CVE-2025-11832
Azure Access BLU-IC Allocation of Resources Without Limits or Throttling allows Flooding
Critical
Allocation of Resources Without Limits or Throttling allows Flooding.
▶
CSA-2025-61
Commend Symphony MX Web Interface Missing Common Security Headers in HTTP Response
Medium
Several vulnerabilities have been discovered in the HTTP server response of the Symphony MX web interface which are caused by missing common HTTP security headers. Due to insufficient cache control, a threat actor could read sensitive data stored within the browser cache on the local machine. The missing content type options header permits the browser to incorrectly identify content types when no content type is specified by the server. A firmware update is required to fix the vulnerability.
▶
CSA-2025-60
Commend Symphony MX Web Interface Allows Uploading Arbitrary Data to Media
Medium
A vulnerability has been discovered in the Symphony MX web interface which allows uploading arbitrary data to the internal media storage "Media", where audio and images are stored. Due to insufficient input and file content validation, an authenticated attacker could upload malicious files. If successful, a threat actor can trick an authenticated user to run malicious file content on the local machine. A firmware update is required to fix the vulnerability. Note: Symphony MX devices cannot protect authenticated users from downloading and executing files.
▶
CSA-2025-58
Commend Symphony MX Local Privilege Escalation via Privileged Executable
High
The Symphony MX device contains a privileged executable file that is writeable, creating a critical security vulnerability. Threat actors with access to the device could exploit this vulnerability by modifying the executable with malicious code, which could then be executed with root privileges. If successful, attackers could achieve complete system compromise, establish persistence, execute arbitrary commands with root privileges or create backdoors for ongoing unauthorised access. A firmware update is required to fix the vulnerability. Note: Symphony MX devices are protected against local attack vectors, as remote maintenance via SSH is disabled by default.
▶
CSA-2025-56
Commend VirtuoSIS/S3/S6 Local Privilege Escalation via Service Hijacking
Critical
A security issue was discovered where local users can escalate privileges by manipulating environment variables that affect privileged processes. Threat actors could exploit this vulnerability by injecting malicious values into environment variables used by services running with elevated privileges. If successful, attackers could execute arbitrary commands with elevated privileges, potentially leading to complete system compromise, unauthorised access to sensitive data or the ability to modify the system configuration or security controls.
▶
CSA-2025-55
Commend Symphony MX Web Interface Vulnerable to Clickjacking and Cross-Frame Scripting (XFS)
Medium
Several vulnerabilities have been discovered in the Symphony MX web interface. Due to missing HTTP security headers, the web interface is vulnerable to clickjacking and cross-frame scripting (XFS) attacks. An attacker could embed the web interface into a crafted HTML web page. Such a malicious web page could introduce hidden mechanism to steal the credentials during user authentication or to modify the device configuration without being noticed. A firmware update is required to fix the vulnerability.
▶
CVE-2024-47258
AXIS/2N Missing Certificate Validation leads to MitM Attack
High
2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices.
▶
CVE-2024-13417
AXIS/2N Denial of Service of the RFID Reader Module
Medium
Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state.
▶
CVE-2024-13416
AXIS/2N Authentication Token Disclosure in Log Files
Medium
Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log.
▶
CVE-2023-24590
Format String Vulnerability in Gallagher Physical Access Controller 6000
High
A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.
▶
CVE-2023-22439
Buffer Overflow Vulnerability in Gallagher Physical Access Controller 6000 and 7000
Low
Improper input validation of a large HTTP request in the Controller 6000 and Controller 7000 optional diagnostic web interface (Port 80) can be used to perform a Denial of Service of the diagnostic web interface. Further exploitation could not be proven due to this being a totally blind test case, but should be considered.
▶
CVE-2015-0250
XML External Entity (XXE) Injection Vulnerability in Apache Batik (Java SVG Toolkit)
Medium
Batik is a Java-based toolkit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format for various purposes, such as display, generation or manipulation. [1] Batik offers several classes for svg to png/jpg conversion, which suffer from a XML External Entity Injection due to the evaluation of external entities within the given svg file. If an application offers the possibility to upload a svg file an attacker can put in a malicious formed file and retrieve sensitive information such as the content of files of the respective server. The type of file that can be retrieved depends on the user context in which the application is running. Further information about the vulnerability can be seen here: [2].