Show filters
38 Total Results
Displaying 1-10 of 38
Sort by:
Attacker Value
Low

CVE-2020-12695 "CallStranger"

Disclosure Date: June 08, 2020 (last updated April 09, 2024)
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
Attacker Value
Unknown

CVE-2022-46143

Disclosure Date: December 13, 2022 (last updated January 14, 2025)
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
0
Attacker Value
Unknown

CVE-2022-46142

Disclosure Date: December 13, 2022 (last updated January 14, 2025)
Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.
0
Attacker Value
Unknown

CVE-2022-46140

Disclosure Date: December 13, 2022 (last updated January 14, 2025)
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
0
Attacker Value
Unknown

CVE-2020-12773

Disclosure Date: June 08, 2020 (last updated November 28, 2024)
A security misconfiguration vulnerability exists in the SDK of some Realtek ADSL/PON Modem SoC firmware, which allows attackers using a default password to execute arbitrary commands remotely via the build-in network monitoring tool.
Attacker Value
Unknown

CVE-2018-20373

Disclosure Date: December 23, 2018 (last updated November 27, 2024)
Tenda ADSL modem routers 1.0.1 allow XSS via the hostname of a DHCP client.
0
Attacker Value
Unknown

CVE-2014-6435

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.
0
Attacker Value
Unknown

CVE-2014-6436

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.
0
Attacker Value
Unknown

CVE-2014-6437

Disclosure Date: January 12, 2018 (last updated November 26, 2024)
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file.
0
Attacker Value
Unknown

CVE-2017-14147

Disclosure Date: September 07, 2017 (last updated November 26, 2024)
An issue was discovered on FiberHome User End Routers Bearing Model Number AN1020-25 which could allow an attacker to easily restore a router to its factory settings by simply browsing to the link http://[Default-Router-IP]/restoreinfo.cgi & execute it. Due to improper authentication on this page, the software accepts the request hence allowing attacker to reset the router to its default configurations which later could allow attacker to login to router by using default username/password.
0