Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown
CVE-2018-9232
Disclosure Date: May 01, 2018 (last updated November 26, 2024)
Due to the lack of firmware authentication in the upgrade process of T&W WIFI Repeater BE126 devices, an attacker can craft a malicious firmware and use it as an update.
0
Attacker Value
Unknown
CVE-2017-8771
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
0
Attacker Value
Unknown
CVE-2017-8772
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1. Read the entire file system; 2. Write to the file system; or 3. Execute any code that attacker desires (malicious or not).
0
Attacker Value
Unknown
CVE-2017-8770
Disclosure Date: September 20, 2017 (last updated November 26, 2024)
There is LFD (local file disclosure) on BE126 WIFI repeater 1.0 devices that allows attackers to read the entire filesystem on the device via a crafted getpage parameter.
0
Attacker Value
Unknown
CVE-2017-13713
Disclosure Date: September 07, 2017 (last updated November 26, 2024)
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.
0