Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
725
VMScore
CVE-2017-11322
The chroothole_client executable in UCOPIA Wireless Appliance prior to 5.1.8 allows remote malicious users to gain root privileges via a dollar sign ($) metacharacter in the argument to chroothole_client.
Ucopia Ucopia Wireless Appliance
1 EDB exploit
446
VMScore
CVE-2021-28937
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
668
VMScore
CVE-2006-3286
The internal database in Cisco Wireless Control System (WCS) for Linux and Windows prior to 3.2(63) stores a hard-coded username and password in plaintext within unspecified files, which allows remote authenticated users to access the database (aka bug CSCsd15951).
Cisco Wireless Control System
801
VMScore
CVE-2007-2034
Unspecified vulnerability in Cisco Wireless Control System (WCS) prior to 4.0.87.0 allows remote authenticated users to gain the privileges of the SuperUsers group, and manage the application and its networks, related to the group membership of user accounts, aka Bug ID CSCsg0519...
Cisco Wireless Control System
632
VMScore
CVE-2013-3581
ajax.cgi in the web interface on the Choice Wireless Green Packet WIXFMR-111 4G WiMax modem allows remote malicious users to obtain sensitive information via an Ajax (1) wmxState or (2) netState request.
Choice Wireless Wixfmr-111 -
445
VMScore
CVE-2021-28936
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
NA
CVE-2023-52161
The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) prior to 2.14 allows malicious users to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4...
Intel Inet Wireless Daemon
890
VMScore
CVE-2017-11632
An issue exists on Wireless IP Camera 360 devices. A root account with a known SHA-512 password hash exists, which makes it easier for remote malicious users to obtain administrative access via a TELNET session.
- Wireless Ip Camera 360 -
445
VMScore
CVE-2017-11633
An issue exists on Wireless IP Camera 360 devices. Remote attackers can discover RTSP credentials by connecting to TCP port 9527 and reading the InsertConnect field.
- Wireless Ip Camera 360 -
890
VMScore
CVE-2017-11634
An issue exists on Wireless IP Camera 360 devices. Remote attackers can discover a weakly encoded admin password by connecting to TCP port 9527 and reading the password field of the debugging information, e.g., nTBCS19C corresponds to a password of 123456.
- Wireless Ip Camera 360 -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »