Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wi-fi vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-46025
Totolink N200RE_V5 V9.3.5u.6255_B20211224 is vulnerable to Incorrect Access Control. The device allows remote malicious users to obtain Wi-Fi system information, such as Wi-Fi SSID and Wi-Fi password, without logging into the management page.
Totolink N200re V5 Firmware 9.3.5u.6255 B20211224
3.3
CVSSv2
CVE-2013-2310
SoftBank Wi-Fi Spot Configuration Software, as used on SoftBank SHARP 3G handsets, SoftBank Panasonic 3G handsets, SoftBank NEC 3G handsets, SoftBank Samsung 3G handsets, SoftBank mobile Wi-Fi routers, SoftBank Android smartphones with the Wi-Fi application prior to 1.7.1, SoftBa...
Softbank Wi-fi Spot Configuration Software -
Softbank Sharp 3g Handset 941p
Softbank Sharp 3g Handset 001p
Softbank Sharp 3g Handset 944sh
Softbank Sharp 3g Handset 945shg
Softbank Panasonic 3g Handset 942p
Softbank Nec 3g Handset 931n
Softbank Sharp 3g Handset 931n
Softbank Sharp 3g Handset 940n
Softbank Sharp 3g Handset 001n
Softbank Sharp 3g Handset 940sh
Softbank Sharp 3g Handset 941sh
Softbank Nec 3g Handset 001n
Softbank Samsung 3g Handset 941sc
Softbank Mobile Wi-fi Router 101sb
Softbank Mobile Wi-fi Router 102z
Softbank Sharp 3g Handset 002sh
Softbank Sharp 3g Handset 004sh
Softbank Sharp 3g Handset 004shp3
Softbank Panasonic 3g Handset 941p
Softbank Sharp 3g Handset 941sc
Softbank Sharp 3g Handset 942p
5
CVSSv2
CVE-2019-20612
An issue exists on Samsung mobile devices with N(7.x) and O(8.x) (Broadcom Wi-Fi, and SEC Wi-Fi chipsets) software. Wi-Fi allows a denial of service via TCP SYN packets. The Samsung ID is SVE-2018-13162 (March 2019).
Google Android 7.0
Google Android 7.1.0
Google Android 7.1.1
Google Android 7.1.2
Google Android 8.0
Google Android 8.1
2.9
CVSSv2
CVE-2017-13079
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.2
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.10
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.4.11
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
2 Articles
3.3
CVSSv2
CVE-2019-17098
Use of hard-coded cryptographic key vulnerability in August Connect Wi-Fi Bridge App, Connect Firmware allows an malicious user to decrypt an intercepted payload containing the Wi-Fi network authentication credentials. This issue affects: August Connect Wi-Fi Bridge App version v...
August August Home
August Connect Wi-fi Bridge Firmware
NA
CVE-2023-42530
Improper access control vulnerability in SecSettings prior to SMR Nov-2023 Release 1 allows malicious users to enable Wi-Fi and Wi-Fi Direct without User Interaction.
Samsung Android 11.0
Samsung Android 12.0
Samsung Android 13.0
7.5
CVSSv2
CVE-2017-9417
Broadcom BCM43xx Wi-Fi chips allow remote malicious users to execute arbitrary code via unspecified vectors, aka the "Broadpwn" issue.
Broadcom Bcm43xx Wi-fi Chipset Firmware -
1 EDB exploit
1 Github repository
2 Articles
NA
CVE-2023-30727
Improper access control vulnerability in SecSettings prior to SMR Oct-2023 Release 1 allows malicious users to enable Wi-Fi and connect arbitrary Wi-Fi without User Interaction.
Samsung Android 11.0
Samsung Android 12.0
Samsung Android 13.0
3.3
CVSSv2
CVE-2021-43282
An issue exists on Victure WR1200 devices up to and including 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz ne...
Govicture Wr1200 Firmware
8.3
CVSSv2
CVE-2019-6496
The ThreadX-based firmware on Marvell Avastar Wi-Fi devices, models 88W8787, 88W8797, 88W8801, 88W8897, and 88W8997, allows remote malicious users to execute arbitrary code or cause a denial of service (block pool overflow) via malformed Wi-Fi packets during identification of ava...
Marvell 88w8787 Firmware -
Marvell 88w8797 Firmware -
Marvell 88w8801 Firmware -
Marvell 88w8897 Firmware -
Marvell 88w8997 Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-34377
CVE-2024-20859
CVE-2023-49606
inject
arbitrary
CVE-2024-33788
CVE-2024-30973
IDOR
CVE-2024-33907
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »