Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gateway firmware vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2017-2238
Cross-site request forgery (CSRF) vulnerability in Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and previous versions and Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and previous versions allows remote malicious users to hijack the authentication of...
Toshiba Hem-gw16a Firmware
Toshiba Hem-gw26a Firmware
6.8
CVSSv3
CVE-2016-9337
An issue exists in Tesla Motors Model S automobile, all firmware versions before version 7.1 (2.36.31) with web browser functionality enabled. The vehicle's Gateway ECU is susceptible to commands that may allow an malicious user to install malicious software allowing the mal...
Tesla Gateway Ecu -
5.9
CVSSv3
CVE-2017-5933
Citrix NetScaler ADC and NetScaler Gateway 10.5 before Build 65.11, 11.0 before Build 69.12/69.123, and 11.1 before Build 51.21 randomly generates GCM nonces, which makes it marginally easier for remote malicious users to obtain the GCM authentication key and spoof data by levera...
Citrix Netscaler Application Delivery Controller Firmware
1 Github repository
8
CVSSv3
CVE-2016-7454
CSRF vulnerability on Technicolor TC dpc3941T (formerly Cisco dpc3941T) devices with firmware dpc3941-P20-18-v303r20421733-160413a-CMCST allows an malicious user to change the Wi-Fi password, open the remote management interface, or reset the router.
Technicolor Xfinity Gateway Router Dpc3941t Firmware Dpc3941-p20-18-v303r20421733-160413a-cmcst
1 EDB exploit
9.8
CVSSv3
CVE-2016-6406
Cisco IronPort AsyncOS 9.1.2-023, 9.1.2-028, 9.1.2-036, 9.7.2-046, 9.7.2-047, 9.7.2-054, 10.0.0-124, and 10.0.0-125 on Email Security Appliance (ESA) devices, when Enrollment Client prior to 1.0.2-065 is installed, allows remote malicious users to obtain root access via a connect...
Cisco Email Security Appliance Firmware 9.1.2-036
Cisco Email Security Appliance Firmware 9.7.2-046
Cisco Email Security Appliance Firmware 10.0.0-124
Cisco Email Security Appliance Firmware 10.0.0-125
Cisco Email Security Appliance Firmware 9.1.2-023
Cisco Email Security Appliance Firmware 9.1.2-028
Cisco Email Security Appliance Firmware 9.7.2-047
Cisco Email Security Appliance Firmware 9.7.2-054
9.8
CVSSv3
CVE-2016-2331
The web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware prior to 01A.8 has a default password, which makes it easier for remote malicious users to obtain access via unspecified vectors.
Systech Syslink Sl-1000 Modular Gateway Firmware -
7.5
CVSSv3
CVE-2016-2333
SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware prior to 01A.8 use the same hardcoded encryption key across different customers' installations, which allows malicious users to defeat cryptographic protection mechanisms by leveraging knowledge o...
Systech Syslink Sl-1000 Modular Gateway Firmware -
8.8
CVSSv3
CVE-2016-2332
flu.cgi in the web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware prior to 01A.8 allows remote authenticated users to execute arbitrary commands via the 5066 (aka dnsmasq) parameter.
Systech Syslink Sl-1000 Modular Gateway Firmware -
7.5
CVSSv3
CVE-2016-1326
The administration interface on Cisco DPQ3925 devices with firmware r1 allows remote malicious users to cause a denial of service (device restart) via a crafted HTTP request, aka Bug ID CSCup48105.
Cisco Dpq3925 8x4 Docsis 3.0 Wireless Residential Gateway With Embedded Digital Voice Adapter R1 Base
10
CVSSv3
CVE-2015-7930
Adcon Telemetry A840 Telemetry Gateway Base Station has hardcoded credentials, which allows remote malicious users to obtain administrative access via unspecified vectors.
Adcon A840 Telemetry Gateway Base Station Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30043
camera
CVE-2023-40404
CVE-2024-2793
client side
CVE-2024-4469
CVE-2024-3565
CVE-2024-29825
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »