Show filters
117 Total Results
Displaying 31-40 of 117
Sort by:
Attacker Value
Unknown
CVE-2024-23630
Disclosure Date: January 26, 2024 (last updated February 02, 2024)
An arbitrary firmware upload vulnerability exists in the Motorola
MR2600. An attacker can exploit this vulnerability to achieve code
execution on the device. Authentication is required, however can be
bypassed.
0
Attacker Value
Unknown
CVE-2024-23629
Disclosure Date: January 26, 2024 (last updated February 02, 2024)
An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.
0
Attacker Value
Unknown
CVE-2024-23628
Disclosure Date: January 26, 2024 (last updated February 02, 2024)
A command injection vulnerability exists in the
'SaveStaticRouteIPv6Params' parameter of the Motorola MR2600. A remote
attacker can exploit this vulnerability to achieve command execution.
Authentication is required, however can be bypassed.
0
Attacker Value
Unknown
CVE-2024-23627
Disclosure Date: January 26, 2024 (last updated February 02, 2024)
A command injection vulnerability exists in the 'SaveStaticRouteIPv4Params' parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.
0
Attacker Value
Unknown
CVE-2024-23626
Disclosure Date: January 26, 2024 (last updated February 02, 2024)
A command injection vulnerability exists in the ‘SaveSysLogParams’
parameter of the Motorola MR2600. A remote attacker can exploit this
vulnerability to achieve command execution. Authentication is required,
however can be bypassed.
0
Attacker Value
Unknown
CVE-2022-3681
Disclosure Date: October 27, 2023 (last updated November 08, 2023)
A vulnerability has been identified in the MR2600 router v1.0.18 and earlier that could allow an attacker within range of the wireless network to successfully brute force the WPS pin, potentially allowing them unauthorized access to a wireless network.
0
Attacker Value
Unknown
CVE-2022-27813
Disclosure Date: October 19, 2023 (last updated October 28, 2023)
Motorola MTM5000 series firmwares lack properly configured memory protection of pages shared between the OMAP-L138 ARM and DSP cores. The SoC provides two memory protection units, MPU1 and MPU2, to enforce the trust boundary between the two cores. Since both units are left unconfigured by the firmwares, an adversary with control over either core can trivially gain code execution on the other, by overwriting code located in shared RAM or DDR2 memory regions.
0
Attacker Value
Unknown
CVE-2022-26943
Disclosure Date: October 19, 2023 (last updated October 28, 2023)
The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400.
0
Attacker Value
Unknown
CVE-2022-26942
Disclosure Date: October 19, 2023 (last updated October 26, 2023)
The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.
0
Attacker Value
Unknown
CVE-2022-26941
Disclosure Date: October 19, 2023 (last updated October 26, 2023)
A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges.
0