Impact
The vulnerability resides in the menu_lev1 parameter of Kados GreenBee R10, where an attacker can inject arbitrary SQL code without authentication. This permits extraction of confidential database content or alteration of records, compromising both confidentiality and integrity of the system.
Affected Systems
Kados Inc. products, specifically Kados GreenBee R10. The affected version is identified by the CPE as r10_greenbee, indicating all releases within the R10 family.
Risk and Exploitability
With a CVSS score of 8.8 the flaw is classified as high severity. The EPSS score of less than 1% suggests a low likelihood of exploit in the wild, and the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is through simple HTTP requests to the web application, and any user can trigger it because no authentication is required.
OpenCVE Enrichment