Show filters
56 Total Results
Displaying 11-20 of 56
Sort by:
Attacker Value
Unknown
CVE-2021-40288
Disclosure Date: December 07, 2021 (last updated October 07, 2023)
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames
0
Attacker Value
Unknown
CVE-2021-43282
Disclosure Date: November 30, 2021 (last updated October 07, 2023)
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
0
Attacker Value
Unknown
CVE-2021-37910
Disclosure Date: November 12, 2021 (last updated November 28, 2024)
ASUS routers Wi-Fi protected access protocol (WPA2 and WPA3-SAE) has improper control of Interaction frequency vulnerability, an unauthenticated attacker can remotely disconnect other users' connections by sending specially crafted SAE authentication frames.
0
Attacker Value
Unknown
CVE-2021-41753
Disclosure Date: September 27, 2021 (last updated November 28, 2024)
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in D-Link DIR-X1560, v1.04B04, and DIR-X6060, v1.11B04 allows a remote unauthenticated attacker to disconnect a wireless client via sending specific spoofed SAE authentication frames.
0
Attacker Value
Unknown
CVE-2020-27302
Disclosure Date: June 04, 2021 (last updated November 28, 2024)
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "memcpy" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
0
Attacker Value
Unknown
CVE-2020-27301
Disclosure Date: June 04, 2021 (last updated November 28, 2024)
A stack buffer overflow in Realtek RTL8710 (and other Ameba-based devices) can lead to remote code execution via the "AES_UnWRAP" function, when an attacker in Wi-Fi range sends a crafted "Encrypted GTK" value as part of the WPA2 4-way-handshake.
0
Attacker Value
Unknown
CVE-2020-26140
Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
0
Attacker Value
Unknown
CVE-2020-26143
Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered in the ALFA Windows 10 driver 1030.36.604 for AWUS036ACH. The WEP, WPA, WPA2, and WPA3 implementations accept fragmented plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
0
Attacker Value
Unknown
CVE-2020-26142
Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered in the kernel in OpenBSD 6.6. The WEP, WPA, WPA2, and WPA3 implementations treat fragmented frames as full frames. An adversary can abuse this to inject arbitrary network packets, independent of the network configuration.
0
Attacker Value
Unknown
CVE-2020-26145
Disclosure Date: May 11, 2021 (last updated November 28, 2024)
An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration.
0