Show filters
192 Total Results
Displaying 111-120 of 192
Sort by:
Attacker Value
Unknown
CVE-2023-29803
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the pid parameter in the disconnectVPN function.
0
Attacker Value
Unknown
CVE-2023-29802
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the ip parameter in the setDiagnosisCfg function.
0
Attacker Value
Unknown
CVE-2023-29801
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain multiple command injection vulnerabilities via the rtLogEnabled and rtLogServer parameters in the setSyslogCfg function.
0
Attacker Value
Unknown
CVE-2023-29800
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the FileName parameter in the UploadFirmwareFile function.
0
Attacker Value
Unknown
CVE-2023-29799
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the hostname parameter in the setOpModeCfg function.
0
Attacker Value
Unknown
CVE-2023-29798
Disclosure Date: April 14, 2023 (last updated February 24, 2025)
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function.
0
Attacker Value
Unknown
CVE-2022-47208
Disclosure Date: December 16, 2022 (last updated February 24, 2025)
The “puhttpsniff” service, which runs by default, is susceptible to command injection due to improperly sanitized user input. An unauthenticated attacker on the same network segment as the router can execute arbitrary commands on the device without authentication.
0
Attacker Value
Unknown
CVE-2022-33321
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password).
The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability.
As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed…
0
Attacker Value
Unknown
CVE-2022-33322
Disclosure Date: November 08, 2022 (last updated February 24, 2025)
Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.
0
Attacker Value
Unknown
CVE-2022-40876
Disclosure Date: October 27, 2022 (last updated February 24, 2025)
In Tenda ax1803 v1.0.0.1, the http requests handled by the fromAdvSetMacMtuWan functions, wanSpeed, cloneType, mac, can cause a stack overflow and enable remote code execution (RCE).
0