Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aztech vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-45599
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows malicious users to gain escalated privileges only when specific conditions regarding a given accounts hashed password.
Aztech Wmb250ac Firmware 016 2020
1 Github repository
9.8
CVSSv3
CVE-2014-6436
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal lo...
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
9.8
CVSSv3
CVE-2014-6437
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote malicious users to obtain sensitive device configuration information via vectors involving the ROM file.
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
8.8
CVSSv3
CVE-2022-45600
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal...
Aztech Wmb250ac Firmware 016 2020
1 Github repository
7.5
CVSSv3
CVE-2014-6435
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote malicious users to cause a denial of service (WAN connectivity reset) via a direct request.
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
NA
CVE-2008-6588
Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote malicious users to obtain access if this default is not changed.
Aztech Adsl2\\/2\\+4-port Router -
NA
CVE-2008-6554
cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote malicious users to execute arbitrary commands via shell metacharacters in the query string.
Aztech Adsl2\\/2\\+4-port Router 3.7.0
NA
CVE-2007-4733
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote malicious users to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packe...
Aztech Dsl 600eu Router
NA
CVE-1999-0077
Predictable TCP sequence numbers allow spoofing.
Microsoft Windows Nt 4.0
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
hardcoded
arbitrary code
CVE-2024-2404
CVE-2024-21111
CVE-2024-28627
CVE-2024-4073
information disclosure
CVE-2024-32780
CVE-2024-4040
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started