Show filters
20 Total Results
Displaying 11-20 of 20
Sort by:
Attacker Value
Unknown
CVE-2021-28936
Disclosure Date: March 29, 2021 (last updated February 22, 2025)
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
0
Attacker Value
Unknown
CVE-2021-28937
Disclosure Date: March 29, 2021 (last updated February 22, 2025)
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
0
Attacker Value
Unknown
CVE-2021-28160
Disclosure Date: March 18, 2021 (last updated February 22, 2025)
Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) suffers from a reflected XSS vulnerability due to unsanitized SSID value when the latter is displayed in the /repeater.html page ("Repeater Wizard" homepage section).
0
Attacker Value
Unknown
CVE-2019-25024
Disclosure Date: February 19, 2021 (last updated February 22, 2025)
OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter.
0
Attacker Value
Unknown
CVE-2017-9649
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
A Use of Hard-Coded Cryptographic Key issue was discovered in Mirion Technologies DMC 3000 Transmitter Module, iPam Transmitter f/DMC 2000, RDS-31 iTX and variants (including RSD31-AM Package), DRM-1/2 and variants (including Solar PWR Package), DRM and RDS Based Boundary Monitors, External Transmitters, Telepole II, and MESH Repeater (Telemetry Enabled Devices). An unchangeable, factory-set key is included in the 900 MHz transmitter firmware.
0
Attacker Value
Unknown
CVE-2017-8771
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
0
Attacker Value
Unknown
CVE-2017-8772
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1. Read the entire file system; 2. Write to the file system; or 3. Execute any code that attacker desires (malicious or not).
0
Attacker Value
Unknown
CVE-2017-8770
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
There is LFD (local file disclosure) on BE126 WIFI repeater 1.0 devices that allows attackers to read the entire filesystem on the device via a crafted getpage parameter.
0
Attacker Value
Unknown
CVE-2017-13713
Disclosure Date: September 07, 2017 (last updated November 26, 2024)
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.
0
Attacker Value
Unknown
CVE-2016-5673
Disclosure Date: August 25, 2016 (last updated November 25, 2024)
UltraVNC Repeater before 1300 does not restrict destination IP addresses or TCP ports, which allows remote attackers to obtain open-proxy functionality by using a :: substring in between the IP address and port number.
0