Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
phicomm vulnerabilities and exploits
(subscribe to this query)
7.2
CVSSv2
CVE-2022-25213
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.
Phicomm K2 Firmware
Phicomm K3 Firmware
Phicomm K3c Firmware
Phicomm K2g Firmware
Phicomm K2p Firmware
7.2
CVSSv2
CVE-2022-25217
Use of a hard-coded cryptographic key pair by the telnetd_startup service allows an attacker on the local area network to obtain a root shell on the device over telnet. The builds of telnetd_startup included in the version 22.5.9.163 of the K2 firmware, and version 32.1.15.93 of ...
Phicomm K2 Firmware
Phicomm K3c Firmware
6.9
CVSSv2
CVE-2022-25219
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a craft...
Phicomm K2 Firmware
Phicomm K3 Firmware
Phicomm K3c Firmware
Phicomm K2g Firmware
Phicomm K2p Firmware
5.8
CVSSv2
CVE-2022-25214
Improper access control on the LocalClientList.asp interface allows an unauthenticated remote malicious user to obtain sensitive information concerning devices on the local area network, including IP and MAC addresses. Improper access control on the wirelesssetup.asp interface al...
Phicomm K2 Firmware
Phicomm K3 Firmware
Phicomm K3c Firmware
Phicomm K2g Firmware
Phicomm K2p Firmware
9.3
CVSSv2
CVE-2022-25218
The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of ciphertext will be decr...
Phicomm K2 Firmware
Phicomm K3 Firmware
Phicomm K3c Firmware
Phicomm K2g Firmware
Phicomm K2p Firmware
5
CVSSv2
CVE-2022-25215
Improper access control on the LocalMACConfig.asp interface allows an unauthenticated remote malicious user to add (or remove) client MAC addresses to (or from) a list of banned hosts. Clients with those MAC addresses are then prevented from accessing either the WAN or the router...
Phicomm K2 Firmware
Phicomm K3 Firmware
Phicomm K3c Firmware
Phicomm K2g Firmware
Phicomm K2p Firmware
9
CVSSv2
CVE-2019-19117
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.
Phicomm K2\\(psg1218\\) Firmware 22.5.9.163
9
CVSSv2
CVE-2017-11495
PHICOMM K2(PSG1218) devices V22.5.11.5 and previous versions allow unauthenticated remote code execution via a request to an unspecified ASP script; alternatively, the attacker can leverage unauthenticated access to this script to trigger a reboot via an ifType=reboot action.
Phicomm K2\\(psg1218\\)-firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2