Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
iij seil b1 firmware vulnerabilities and exploits
(subscribe to this query)
2.6
CVSSv2
CVE-2009-4409
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 up to and including 2.52 use the same challenge for each authentication attempt, which allows remote malicious users to b...
Iij Seil\\/b1 2.30
Iij Seil\\/b1 2.41
Iij Seil\\/b1 2.50
Iij Seil\\/b1 2.40
Iij Seil\\/b1 2.51
Iij Seil\\/b1 2.52
Iij Seil\\/b1 2.01
Iij Seil\\/b1 2.10
Iij Seil\\/b1 1.00
Iij Seil\\/b1 2.20
Iij Seil\\/b1 2.42
6.8
CVSSv2
CVE-2013-4709
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware prior to 2.82, SEIL/X1 with firmware prior to 4.32, SEIL/X2 with firmware prior to 4.32, SEIL/B1 with firmware prior to 4.32, SEIL/Turbo with firmware prior to 2.16, and SEIL/neu 2FE Plus with fi...
Iij Seil X2 Firmware 1.00
Iij Seil X2 Firmware 4.31
Iij Seil\\/x2
Iij Seil\\%2fturbo Firmware 2.05
Iij Seil\\%2fturbo Firmware 2.15
Iij Seil\\/turbo
Iij Seil\\%2fneu 2fe Plus Firmware 2.15
Iij Seil\\%2fneu 2fe Plus Firmware 2.05
Iij Seil\\/neu 2fe Plus
Iij Seil\\%2fb1 Firmware 1.00
Iij Seil\\%2fb1 Firmware 4.31
Iij Seil\\/b1
Iij Seil\\%2fx86 Firmware 1.00
Iij Seil\\%2fx86 Firmware 2.81
Iij Seil\\/x86
Iij Seil\\%2fx1 Firmware 4.31
Iij Seil\\%2fx1 Firmware 1.00
Iij Seil\\/x1
9.3
CVSSv2
CVE-2009-4292
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 up to and including 2.51 allows remote malicious users to execute arbitrary code via unspecified vectors.
Iij Seil\\/x1 Firmware 2.42
Iij Seil\\/x1 Firmware 2.50
Iij Seil\\/x1 Firmware 2.40
Iij Seil\\/x1 Firmware 2.41
Iij Seil\\/x1 Firmware 2.51
Iij Seil\\/x1
Iij Seil\\/b1 Firmware 2.41
Iij Seil\\/b1 Firmware 2.42
Iij Seil\\/b1 Firmware 2.40
Iij Seil\\/b1 Firmware 2.50
Iij Seil\\/b1 Firmware 2.51
Iij Seil\\/b1
Iij Seil\\/x2 Firmware 2.40
Iij Seil\\/x2 Firmware 2.41
Iij Seil\\/x2 Firmware 2.42
Iij Seil\\/x2 Firmware 2.50
Iij Seil\\/x2 Firmware 2.51
Iij Seil\\/x2
7.1
CVSSv2
CVE-2009-4293
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 up to and including 2.51, when NAT is enabled, allows remote malicious users to cause a denial of service (system restart) via crafted GRE packets.
Iij Seil\\/x1 Firmware 2.50
Iij Seil\\/x1 Firmware 2.51
Iij Seil\\/x1 Firmware 2.30
Iij Seil\\/x1 Firmware 2.40
Iij Seil\\/x1 Firmware 2.41
Iij Seil\\/x1 Firmware 2.42
Iij Seil\\/x1
Iij Seil\\/b1 Firmware 2.51
Iij Seil\\/b1 Firmware 2.42
Iij Seil\\/b1 Firmware 2.50
Iij Seil\\/b1 Firmware 2.30
Iij Seil\\/b1 Firmware 2.40
Iij Seil\\/b1 Firmware 2.41
Iij Seil\\/b1
Iij Seil\\/x2 Firmware 2.42
Iij Seil\\/x2 Firmware 2.50
Iij Seil\\/x2 Firmware 2.51
Iij Seil\\/x2 Firmware 2.40
Iij Seil\\/x2 Firmware 2.41
Iij Seil\\/x2 Firmware 2.30
Iij Seil\\/x2
8.3
CVSSv2
CVE-2011-0454
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 up to and including 1.61, SEIL/B1 with firmware 1.00 up to and including 3.11, SEIL/X1 with firmware 1.00 up to and including 3.11, SEIL/X2 with firmware 1.00 up to and including 3.11, SEIL/...
Iij Seil\\/b1 Firmware 2.10
Iij Seil\\/b1 Firmware 2.20
Iij Seil\\/b1 Firmware 2.52
Iij Seil\\/b1 Firmware 2.60
Iij Seil\\/b1 Firmware 2.61
Iij Seil\\/b1 Firmware 2.75
Iij Seil\\/b1 Firmware 3.01
Iij Seil\\/b1 Firmware 1.00
Iij Seil\\/b1 Firmware 2.01
Iij Seil\\/b1 Firmware 2.50
Iij Seil\\/b1 Firmware 2.51
Iij Seil\\/b1 Firmware 2.73
Iij Seil\\/b1 Firmware 2.74
Iij Seil\\/b1 Firmware 2.30
Iij Seil\\/b1 Firmware 2.40
Iij Seil\\/b1 Firmware 2.62
Iij Seil\\/b1 Firmware 2.72
Iij Seil\\/b1 Firmware 3.02
Iij Seil\\/b1 Firmware 3.10
Iij Seil\\/b1 Firmware 2.41
Iij Seil\\/b1 Firmware 2.42
Iij Seil\\/b1 Firmware 2.63
5.8
CVSSv2
CVE-2010-2363
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 up to and including 2.73, when strict mode is used, does not properly drop packets, which might allow remote malicious users to bypass intended access res...
Iij Seil\\/x1 Firmware 2.52
Iij Seil\\/x1 Firmware 2.51
Iij Seil\\/x1 Firmware 1.31
Iij Seil\\/x1 Firmware 1.32
Iij Seil\\/x1 Firmware 2.61
Iij Seil\\/x1 Firmware 2.60
Iij Seil\\/x1 Firmware 2.63
Iij Seil\\/x1 Firmware 2.62
Iij Seil\\/x1 Firmware 1.22
Iij Seil\\/x1 Firmware 1.30
Iij Seil\\/x1 Firmware 2.20
Iij Seil\\/x1 Firmware 2.30
Iij Seil\\/x1 Firmware 2.72
Iij Seil\\/x1 Firmware 2.70
Iij Seil\\/x1 Firmware 1.20
Iij Seil\\/x1 Firmware 1.21
Iij Seil\\/x1 Firmware 1.44
Iij Seil\\/x1 Firmware 2.10
Iij Seil\\/x1 Firmware 2.40
Iij Seil\\/x1 Firmware 2.41
Iij Seil\\/x1 Firmware 2.73
Iij Seil\\/x1 Firmware 1.10
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started