[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-27843":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-24T12:20:52.508Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":46,"state":47,"summary":48,"references_raw":55,"kevs":69,"epss":9,"epss_history":70,"metrics":71,"affected":84},"CVE-2026-27843","A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recovery mechanisms and network settings, an attacker can induce a persistent lockout state. Because the device lacks a physical reset button, recovery requires specialized technical access via the console to perform a factory reset, resulting in a total denial-of-service for the gateway and its connected RS-485 downstream systems.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-306","Missing Authentication for Critical Function","The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.","weakness","Draft","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-12","Choosing Message Identifier",[],{"id":25,"name":26,"techniques":27},"CAPEC-166","Force the System to Reset Values",[],{"id":29,"name":30,"techniques":31},"CAPEC-216","Communication Channel Manipulation",[],{"id":33,"name":34,"techniques":35},"CAPEC-36","Using Unpublished Interfaces or Functionality",[],{"id":37,"name":38,"techniques":39},"CAPEC-62","Cross Site Request Forgery",[],[],[],[],[],[],[],"2026-04-23T23:54:55.051Z","Received",{"cisa_kev":49,"cisa_ransomware":49,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":50,"severity_score":51,"severity_version":52,"severity_source":53,"severity_vector":54,"severity_status":47},false,"critical",9.2,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:H",[56,61,65],{"url":57,"sources":58,"tags":60},"https://senselive.io/contact",[53,59],"nvd",[],{"url":62,"sources":63,"tags":64},"https://www.cisa.gov/news-events/ics-advisories/icsa-26-111-12",[53,59],[],{"url":66,"sources":67,"tags":68},"https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-111-12.json",[53,59],[],[],[],[72,80],{"source":53,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":73,"cvss_v4_0":79},{"baseScore":74,"baseSeverity":75,"vectorString":76,"impactScore":77,"exploitabilityScore":78},9.1,"CRITICAL","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",8.7,10,{"baseScore":51,"baseSeverity":75,"vectorString":54,"impactScore":9,"exploitabilityScore":9},{"source":59,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":81,"cvss_v4_0":82},{"baseScore":74,"baseSeverity":75,"vectorString":76,"impactScore":77,"exploitabilityScore":78},{"baseScore":51,"baseSeverity":75,"vectorString":83,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[85],{"ecosystem":9,"name":86,"vendor":87,"product":88,"cpe_part":89,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":90},"X3050","senselive","x3050","a",[91],{"version":92,"is_range":49,"range_type":53,"version_start":92,"version_start_type":93,"version_end":92,"version_end_type":93,"fixed_in":9},"V1.523","including"]