Show filters
28 Total Results
Displaying 11-20 of 28
Sort by:
Attacker Value
Unknown
CVE-2020-13620
Disclosure Date: November 24, 2020 (last updated February 22, 2025)
Fastweb FASTGate GPON FGA2130FWB devices through 2020-05-26 allow CSRF via the router administration web panel, leading to an attacker's ability to perform administrative actions such as modifying the configuration.
0
Attacker Value
Unknown
A vulnerability was discovered in HiNet GPON firmware < I040GWR190731 that allo…
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
A service which is hosted on port 6998 in HiNet GPON firmware < I040GWR190731 allows an attacker to execute a specific command to read arbitrary files. CVSS 3.0 Base score 9.3. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L).
0
Attacker Value
Unknown
A remote command execution vulnerability was discovered in HiNet GPON firmware …
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
An “invalid command” handler issue was discovered in HiNet GPON firmware < I040GWR190731. It allows an attacker to execute arbitrary command through port 6998. CVSS 3.0 Base score 10.0. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
0
Attacker Value
Unknown
A vulnerability was discovered in HiNet GPON firmware < I040GWR190731 that allo…
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
A service which is hosted on port 3097 in HiNet GPON firmware < I040GWR190731 allows an attacker to execute a specific command to read arbitrary files. CVSS 3.0 Base score 9.3. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L).
0
Attacker Value
Unknown
HiNet GPON firmware version < I040GWR190731 allows a user login to device witho…
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
HiNet GPON firmware version < I040GWR190731 allows an attacker login to device without any authentication.
0
Attacker Value
Unknown
A remote command execution vulnerability was discovered in HiNet GPON firmware …
Disclosure Date: October 17, 2019 (last updated November 27, 2024)
An “invalid command” handler issue was discovered in HiNet GPON firmware < I040GWR190731. It allows an attacker to execute arbitrary command through port 3097. CVSS 3.0 Base score 10.0. CVSS vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).
0
Attacker Value
Unknown
CVE-2019-10677
Disclosure Date: September 05, 2019 (last updated November 27, 2024)
Multiple Cross-Site Scripting (XSS) issues in the web interface on DASAN Zhone ZNID GPON 2426A EU version S3.1.285 devices allow a remote attacker to execute arbitrary JavaScript via manipulation of an unsanitized GET parameter: /zhndnsdisplay.cmd (name), /wlsecrefresh.wl (wlWscCfgMethod, wl_wsc_reg).
0
Attacker Value
Unknown
CVE-2019-7385
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below, The values of the newpass and confpass parameters in /bin/WebMGR are used in a system call in the firmware. Because there is no user input validation, this leads to authenticated code execution on the device.
0
Attacker Value
Unknown
CVE-2019-7384
Disclosure Date: March 21, 2019 (last updated November 27, 2024)
An authenticated shell command injection issue has been discovered in Raisecom ISCOM HT803G-U, HT803G-W, HT803G-1GE, and HT803G GPON products with the firmware version ISCOMHT803G-U_2.0.0_140521_R4.1.47.002 or below. The value of the fmgpon_loid parameter is used in a system call inside the boa binary. Because there is no user input validation, this leads to authenticated code execution on the device.
0
Attacker Value
Unknown
CVE-2019-3920
Disclosure Date: March 05, 2019 (last updated November 27, 2024)
The Alcatel Lucent I-240W-Q GPON ONT using firmware version 3FE54567BOZJ19 is vulnerable to authenticated command injection via crafted HTTP request sent by a remote, authenticated attacker to /GponForm/device_Form?script/.
0