Show filters
56 Total Results
Displaying 51-56 of 56
Sort by:
Attacker Value
Unknown

CVE-2017-16887

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services can result in disclosure of the WLAN key/password.
0
Attacker Value
Unknown

CVE-2017-16885

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
Improper Permissions Handling in the Portal on FiberHome LM53Q1 VH519R05C01S38 devices (intended for obtaining information about Internet Usage, Changing Passwords, etc.) allows remote attackers to look for the information without authenticating. The information includes Version of device, Firmware ID, Connected users to device along their MAC Addresses, etc.
0
Attacker Value
Unknown

CVE-2017-16886

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services via CSRF can result in an unauthorized change of username or password of the administrator of the portal.
0
Attacker Value
Unknown

CVE-2017-15647

Disclosure Date: October 19, 2017 (last updated November 26, 2024)
On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.
0
Attacker Value
Unknown

CVE-2017-14147

Disclosure Date: September 07, 2017 (last updated November 26, 2024)
An issue was discovered on FiberHome User End Routers Bearing Model Number AN1020-25 which could allow an attacker to easily restore a router to its factory settings by simply browsing to the link http://[Default-Router-IP]/restoreinfo.cgi & execute it. Due to improper authentication on this page, the software accepts the request hence allowing attacker to reset the router to its default configurations which later could allow attacker to login to router by using default username/password.
0
Attacker Value
Unknown

CVE-2017-5544

Disclosure Date: January 23, 2017 (last updated November 25, 2024)
An issue was discovered on FiberHome Fengine S5800 switches V210R240. An unauthorized attacker can access the device's SSH service, using a password cracking tool to establish SSH connections quickly. This will trigger an increase in the SSH login timeout (each of the login attempts will occupy a connection slot for a longer time). Once this occurs, legitimate login attempts via SSH/telnet will be refused, resulting in a denial of service; you must restart the device.