Show filters
42 Total Results
Displaying 1-10 of 42
Sort by:
Attacker Value
Unknown
CVE-2024-5196
Disclosure Date: May 22, 2024 (last updated May 23, 2024)
A vulnerability classified as critical has been found in Arris VAP2500 08.50. This affects an unknown part of the file /tools_command.php. The manipulation of the argument cmb_header/txt_command leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-265833 was assigned to this vulnerability.
0
Attacker Value
Unknown
CVE-2024-5195
Disclosure Date: May 22, 2024 (last updated May 22, 2024)
A vulnerability was found in Arris VAP2500 08.50. It has been rated as critical. Affected by this issue is some unknown functionality of the file /diag_s.php. The manipulation of the argument customer_info leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265832.
0
Attacker Value
Unknown
CVE-2024-5194
Disclosure Date: May 22, 2024 (last updated May 22, 2024)
A vulnerability was found in Arris VAP2500 08.50. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /assoc_table.php. The manipulation of the argument id leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-265831.
0
Attacker Value
Unknown
CVE-2023-40038
Disclosure Date: December 27, 2023 (last updated January 05, 2024)
Arris DG860A and DG1670A devices have predictable default WPA2 PSKs that could lead to unauthorized remote access. (They use the first 6 characters of the SSID and the last 6 characters of the BSSID, decrementing the last digit.)
0
Attacker Value
Unknown
CVE-2023-40039
Disclosure Date: September 11, 2023 (last updated October 08, 2023)
An issue was discovered on ARRIS TG852G, TG862G, and TG1672G devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default WPA2-PSK value by observing a beacon frame.
0
Attacker Value
Unknown
CVE-2018-25057
Disclosure Date: December 28, 2022 (last updated October 19, 2023)
A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link["id"] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996.
0
Attacker Value
Unknown
CVE-2022-45028
Disclosure Date: December 13, 2022 (last updated October 08, 2023)
A cross-site scripting (XSS) vulnerability in Arris NVG443B 9.3.0h3d36 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request sent to /cgi-bin/logs.ha.
0
Attacker Value
Unknown
CVE-2022-31793
Disclosure Date: August 04, 2022 (last updated October 08, 2023)
do_request in request.c in muhttpd before 1.1.7 allows remote attackers to read arbitrary files by constructing a URL with a single character before a desired path on the filesystem. This occurs because the code skips over the first character when serving files. Arris NVG443, NVG599, NVG589, and NVG510 devices and Arris-derived BGW210 and BGW320 devices are affected.
0
Attacker Value
Unknown
CVE-2022-26994
Disclosure Date: March 15, 2022 (last updated October 07, 2023)
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pptp function via the pptpUserName and pptpPassword parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
0
Attacker Value
Unknown
CVE-2022-26993
Disclosure Date: March 15, 2022 (last updated October 07, 2023)
Arris routers SBR-AC1900P 1.0.7-B05, SBR-AC3200P 1.0.7-B05 and SBR-AC1200P 1.0.5-B05 were discovered to contain a command injection vulnerability in the pppoe function via the pppoeUserName, pppoePassword, and pppoe_Service parameters. This vulnerability allows attackers to execute arbitrary commands via a crafted request.
0