Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
network interface router vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2015-5988
The web management interface on Belkin F9K1102 2 devices with firmware 2.10.17 has a blank password, which allows remote malicious users to obtain administrative privileges by leveraging a LAN session.
Belkin N600 Db Wi-fi Dual-band N\\\\\\+ Router F9k1102 Firmware 2.10.17
7.8
CVSSv2
CVE-2010-0584
Unspecified vulnerability in Cisco IOS 12.4, when NAT SCCP fragmentation support is enabled, allows remote malicious users to cause a denial of service (device reload) via crafted Skinny Client Control Protocol (SCCP) packets, aka Bug ID CSCsy09250.
Cisco Ios 12.4gc
Cisco Ios 12.4xg
Cisco Ios 12.4xj
Cisco Ios 12.4xt
Cisco Ios 12.4xv
Cisco Ios 12.4ye
Cisco Ios 12.4md
Cisco Ios 12.4mda
Cisco Ios 12.4xk
Cisco Ios 12.4xl
Cisco Ios 12.4xw
Cisco Ios 12.4xy
Cisco Ios 12.4sw
Cisco Ios 12.4t
Cisco Ios 12.4xm
Cisco Ios 12.4xn
Cisco Ios 12.4xp
Cisco Ios 12.4xz
Cisco Ios 12.4ya
Cisco Ios 12.4yg
Cisco Ios 12.4xe
Cisco Ios 12.4xf
10
CVSSv2
CVE-2015-5989
Belkin F9K1102 2 devices with firmware 2.10.17 rely on client-side JavaScript code for authorization, which allows remote malicious users to obtain administrative privileges via certain changes to LockStatus and Login_Success values.
Belkin N600 Db Wi-fi Dual-band N\\\\\\+ Router F9k1102 Firmware 2.10.17
9.3
CVSSv2
CVE-2015-7283
The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote malicious users to obtain administrative privileges by leveraging a LAN session.
Zyxel Nbg-418n Firmware 1.00\\(aadz.3\\)c0
7.8
CVSSv2
CVE-2016-6378
Cisco IOS XE 3.1 up to and including 3.17 and 16.1 up to and including 16.2 allows remote malicious users to cause a denial of service (device reload) via crafted ICMP packets that require NAT, aka Bug ID CSCuw85853.
Cisco Ios Xe 3.3.1s
Cisco Ios Xe 3.7.4as
Cisco Ios Xe 3.15.0s
Cisco Ios Xe 3.11.4s
Cisco Ios Xe 3.14.2s
Cisco Ios Xe 3.16.0s
Cisco Ios Xe 3.13.4s
Cisco Ios Xe 3.4.2s
Cisco Ios Xe 3.6.1s
Cisco Ios Xe 3.7.5s
Cisco Ios Xe 3.12.1s
Cisco Ios Xe 3.7.2ts
Cisco Ios Xe 3.16.1as
Cisco Ios Xe 3.8.1s
Cisco Ios Xe 3.10.5s
Cisco Ios Xe 3.5.0s
Cisco Ios Xe 3.1.4s
Cisco Ios Xe 3.9.0as
Cisco Ios Xe 3.14.3s
Cisco Ios Xe 3.9.1as
Cisco Ios Xe 3.4.6s
Cisco Ios Xe 3.10.4s
5
CVSSv2
CVE-2004-1459
Cisco Secure Access Control Server (ACS) 3.2, when configured as a Light Extensible Authentication Protocol (LEAP) RADIUS proxy, allows remote malicious users to cause a denial of service (device crash) via certain LEAP authentication requests.
1.9
CVSSv2
CVE-2017-6666
A vulnerability in the forwarding component of Cisco IOS XR Software for Cisco Network Convergence System (NCS) 5500 Series Routers could allow an authenticated, local malicious user to cause the router to stop forwarding data traffic across Traffic Engineering (TE) tunnels, resu...
Cisco Ios Xr 6.2.1
Cisco Ios Xr 6.1.1
Cisco Ios Xr 6.0 Base
Cisco Ios Xr 6.2.0
Cisco Ios Xr 6.1.2
Cisco Ios Xr 6.0.0
Cisco Ios Xr 6.0.1
Cisco Ios Xr 6.1.3
Cisco Ios Xr 6.1.0
6.8
CVSSv2
CVE-2015-7284
Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote malicious users to hijack the authentication of arbitrary users.
Zyxel Nbg-418n Firmware 1.00\\(aadz.3\\)c0
Zyxel Nbg-418n
6.4
CVSSv2
CVE-2018-14847
MikroTik RouterOS up to and including 6.42 allows unauthenticated remote malicious users to read arbitrary files and remote authenticated malicious users to write arbitrary files due to a directory traversal vulnerability in the WinBox interface.
Mikrotik Routeros
1 EDB exploit
43 Github repositories
4 Articles
3.3
CVSSv2
CVE-2019-1758
A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent malicious user to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path....
Cisco Ios 15.2\\(1\\)sy7
Cisco Ios 15.1\\(2\\)sy13
Cisco Ios 15.3\\(1\\)sy2
Cisco Ios 15.1\\(1\\)sy2
Cisco Ios 15.2\\(4\\)jn1
Cisco Ios 12.2\\(33\\)sxj8
Cisco Ios 15.1\\(2\\)sy12
Cisco Ios 15.1\\(3\\)svn2
Cisco Ios 15.5\\(1\\)sy2
Cisco Ios 12.2\\(33\\)sxj7
Cisco Ios 15.4\\(1\\)sy1
Cisco Ios 15.1\\(3\\)svi1b
Cisco Ios 15.1\\(2\\)sy1
Cisco Ios 15.1\\(1\\)sy3
Cisco Ios 15.1\\(4\\)m12c
Cisco Ios 12.2\\(33\\)sxj9
Cisco Ios 15.1\\(2\\)sy10
Cisco Ios 15.1\\(2\\)sy9
Cisco Ios 15.1\\(3\\)svp2
Cisco Ios 15.2\\(3\\)ea1
Cisco Ios 15.1\\(1\\)sy6
Cisco Ios 15.4\\(1\\)sy2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-20065
open redirect
CVE-2024-1086
path traversal
CVE-2024-29825
XXE
CVE-2024-29822
CVE-2024-20696
CVE-2024-3564
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »