Show filters
184 Total Results
Displaying 111-120 of 184
Sort by:
Attacker Value
Unknown
CVE-2022-33326
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/config_rollback/` API is affected by a command injection vulnerability.
0
Attacker Value
Unknown
CVE-2022-33325
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/clear_tools_log/` API is affected by command injection vulnerability.
0
Attacker Value
Unknown
CVE-2022-33313
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_https_cert_file/` API is affected by command injection vulnerability.
0
Attacker Value
Unknown
CVE-2022-33328
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/remove/` API is affected by a command injection vulnerability.
0
Attacker Value
Unknown
CVE-2022-33312
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Multiple command injection vulnerabilities exist in the web_server action endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network request can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/action/import_cert_file/` API is affected by command injection vulnerability.
0
Attacker Value
Unknown
CVE-2022-33329
Disclosure Date: June 30, 2022 (last updated February 24, 2025)
Multiple command injection vulnerabilities exist in the web_server ajax endpoints functionalities of Robustel R1510 3.3.0. A specially-crafted network packets can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.The `/ajax/set_sys_time/` API is affected by a command injection vulnerability.
0
Attacker Value
Unknown
CVE-2021-44262
Disclosure Date: March 17, 2022 (last updated February 23, 2025)
A vulnerability is in the 'MNU_top.htm' page of the Netgear W104, version WAC104-V1.0.4.13, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information for the device.
0
Attacker Value
Unknown
CVE-2021-40148
Disclosure Date: January 04, 2022 (last updated February 23, 2025)
In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.
0
Attacker Value
Unknown
CVE-2021-44148
Disclosure Date: December 07, 2021 (last updated February 23, 2025)
GL.iNet GL-AR150 2.x before 3.x devices, configured as repeaters, allow cgi-bin/router_cgi?action=scanwifi XSS when an attacker creates an SSID with an XSS payload as the name.
0
Attacker Value
Unknown
CVE-2021-38085
Disclosure Date: August 11, 2021 (last updated February 23, 2025)
The Canon TR150 print driver through 3.71.2.10 is vulnerable to a privilege escalation issue. During the add printer process, a local attacker can overwrite CNMurGE.dll and, if timed properly, the overwritten DLL will be loaded into a SYSTEM process resulting in escalation of privileges. This occurs because the driver drops a world-writable DLL into a CanonBJ %PROGRAMDATA% location that gets loaded by printisolationhost (a system process).
0