Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
csl dualcom gprs cs2300-r firmware 1.25 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2015-7285
CSL DualCom GPRS CS2300-R devices with firmware 1.25 up to and including 3.53 do not require authentication from Alarm Receiving Center (ARC) servers, which allows man-in-the-middle malicious users to bypass intended access restrictions via a spoofed HSxx response.
Csl Dualcom Gprs Cs2300-r Firmware 1.25
Csl Dualcom Gprs Cs2300-r Firmware 3.53
1 Article
NA
CVE-2015-7286
CSL DualCom GPRS CS2300-R devices with firmware 1.25 up to and including 3.53 rely on a polyalphabetic substitution cipher with hardcoded keys, which makes it easier for remote malicious users to defeat a cryptographic protection mechanism by capturing IP or V.22bis PSTN protocol...
Csl Dualcom Gprs Cs2300-r Firmware 1.25
Csl Dualcom Gprs Cs2300-r Firmware 3.53
1 Article
NA
CVE-2015-7287
CSL DualCom GPRS CS2300-R devices with firmware 1.25 up to and including 3.53 use the same 001984 default PIN across different customers' installations, which allows remote malicious users to execute commands by leveraging knowledge of this PIN and including it in an SMS mes...
Csl Dualcom Gprs Cs2300-r Firmware 1.25
Csl Dualcom Gprs Cs2300-r Firmware 3.53
1 Article
NA
CVE-2015-7288
CSL DualCom GPRS CS2300-R devices with firmware 1.25 up to and including 3.53 allow remote malicious users to modify the configuration via a command in an SMS message, as demonstrated by a "4 2" command.
Csl Dualcom Gprs Cs2300-r Firmware 3.53
Csl Dualcom Gprs Cs2300-r Firmware 1.25
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started