Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-52161
The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) prior to 2.14 allows malicious users to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4...
Intel Inet Wireless Daemon
10
CVSSv2
CVE-2017-11634
An issue exists on Wireless IP Camera 360 devices. Remote attackers can discover a weakly encoded admin password by connecting to TCP port 9527 and reading the password field of the debugging information, e.g., nTBCS19C corresponds to a password of 123456.
- Wireless Ip Camera 360 -
5
CVSSv2
CVE-2017-11635
An issue exists on Wireless IP Camera 360 devices. Attackers can read recordings by navigating to /mnt/idea0 or /mnt/idea1 on the SD memory card.
- Wireless Ip Camera 360 -
7.1
CVSSv2
CVE-2015-0622
The Wireless Intrusion Detection (aka WIDS) functionality on Cisco Wireless LAN Controller (WLC) devices allows remote malicious users to cause a denial of service (device outage) via crafted packets that are improperly handled during rendering of the Signature Events Summary pag...
Cisco Wireless Lan Controller
5
CVSSv2
CVE-2019-18659
The Wireless Emergency Alerts (WEA) protocol allows remote malicious users to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated...
Ready Wireless Emergency Alerts -
5
CVSSv2
CVE-2021-28936
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
5
CVSSv2
CVE-2021-28937
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
7.2
CVSSv2
CVE-2020-25037
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with admin user privileges via an escape from a restricted command.
Ucopia Ucopia Wireless Appliance
7.3
CVSSv2
CVE-2018-8117
A security feature bypass vulnerability exists in the Microsoft Wireless Keyboard 850 which could allow an malicious user to reuse an AES encryption key to send keystrokes to other keyboard devices or to read keystrokes sent by other keyboards for the affected devices, aka "...
Microsoft Wireless Keyboard 850 -
1 Article
4.8
CVSSv2
CVE-2020-17497
eapol.c in iNet wireless daemon (IWD) up to and including 1.8 allows malicious users to trigger a PTK reinstallation by retransmitting EAPOL Msg4/4.
Intel Inet Wireless Daemon
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »