Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests. Attackers can exploit this vulnerability by crafting malicious POST requests with specially constructed SQL payloads that trigger database sleep functions to extract information.
History

Thu, 15 Jan 2026 23:45:00 +0000

Type Values Removed Values Added
Description Vianeos OctoPUS 5 contains a time-based blind SQL injection vulnerability in the 'login_user' parameter during authentication requests. Attackers can exploit this vulnerability by crafting malicious POST requests with specially constructed SQL payloads that trigger database sleep functions to extract information.
Title Vianeos OctoPUS 5 - 'login_user' SQLi
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-15T23:25:46.824Z

Reserved: 2026-01-14T14:39:44.739Z

Link: CVE-2021-47801

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-16T00:16:24.517

Modified: 2026-01-16T00:16:24.517

Link: CVE-2021-47801

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.