Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
actiontec vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2018-19922
Persistent Cross-Site Scripting (XSS) in the advancedsetup_websiteblocking.html Website Blocking page of the Actiontec C1000A router with firmware through CAC004-31.30L.95 allows a remote malicious user to inject arbitrary HTML into the Website Blocking page by inserting arbitrar...
Actiontec C1000a Firmware
8.3
CVSSv2
CVE-2015-2904
Actiontec GT784WN modems with firmware before NCS01-1.0.13 have hardcoded credentials, which makes it easier for remote malicious users to obtain root access by connecting to the web administration interface.
Actiontec Ncs01 Firmware
6.8
CVSSv2
CVE-2015-2905
Cross-site request forgery (CSRF) vulnerability on Actiontec GT784WN modems with firmware before NCS01-1.0.13 allows remote malicious users to hijack the authentication or intranet connectivity of arbitrary users.
Actiontec Ncs01 Firmware
6.8
CVSSv2
CVE-2018-10252
An issue exists on Actiontec WCB6200Q prior to 1.1.10.20a devices. The admin login session cookie is insecurely generated making admin session hijacking possible. When an admin logs in, a session cookie is generated using the time of day rounded to 10ms. Since the web server retu...
Actiontec Wcb6200q Firmware
4.3
CVSSv2
CVE-2013-3097
Unspecified Cross-site scripting (XSS) vulnerability in the Verizon FIOS Actiontec MI424WR-GEN3I router.
Actiontec Mi424wr-gen3i Firmware -
10
CVSSv2
CVE-2018-15556
The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.
Actiontec Web6000q Firmware 1.1.02.22
10
CVSSv2
CVE-2018-15555
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
Actiontec Web6000q Firmware 1.1.02.22
10
CVSSv2
CVE-2018-15557
An issue exists in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 with telnet/netcat.
Actiontec Web6000q Firmware 1.1.02.22
7.2
CVSSv2
CVE-2019-12789
An issue exists on Actiontec T2200H T2200H-31.128L.08 devices, as distributed by Telus. By attaching a UART adapter to the UART pins on the system board, an attacker can use a special key sequence (Ctrl-\) to obtain a shell with root privileges. After gaining root access, the att...
Actiontec T2200h Firmware T2200h-31.1238l.08
6.8
CVSSv2
CVE-2013-0126
Multiple cross-site request forgery (CSRF) vulnerabilities in index.cgi on the Verizon FIOS Actiontec MI424WR-GEN3I router with firmware 40.19.36 allow remote malicious users to hijack the authentication of administrators for requests that (1) add administrative accounts via the ...
Verizon Fios Actiontec Mi424wr-gen31 Router Firmware 40.19.36
Verizon Fios Actiontec Mi424wr-gen31 Router -
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-3675
CVE-2024-3400
CVE-2024-23557
mass assignment
CVE-2023-1389
local file inclusion
CVE-2024-32596
file upload
CVE-2024-32593
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »