Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
gateway firmware vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2014-9198
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware up to and including 1.60 IR 04 has hardcoded credentials, which makes it easier for remote malicious users to obtain access via an FTP session.
Schneider-electric Etg3000 Factorycast Hmi Gateway Firmware
Schneider-electric Tsxetg3000 -
Schneider-electric Tsxetg3010 -
Schneider-electric Tsxetg3021 -
Schneider-electric Tsxetg3022 -
9
CVSSv2
CVE-2019-13128
An issue exists on D-Link DIR-823G devices with firmware 1.02B03. There is a command injection in HNAP1 (exploitable with Authentication) via shell metacharacters in the IPAddress or Gateway field to SetStaticRouteSettings.
Dlink Dir-823g Firmware 1.02b03
6.5
CVSSv2
CVE-2021-37188
An issue exists on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the gateway.
Digi Transport Dr64 Firmware
Digi Transport Dr64 Firmware -
Digi Transport Vc74 Firmware
Digi Transport Wr11 Firmware
Digi Transport Wr11 Xt Firmware
Digi Transport Wr21 Firmware
Digi Transport Wr31 Firmware
Digi Transport Wr41 Firmware
Digi Transport Wr44 Firmware
NA
CVE-2022-47767
A backdoor in Solar-Log Gateway products allows remote access via web panel gaining super administration privileges to the attacker. This affects all Solar-Log devices that use firmware version v4.2.7 up to v5.1.1 (included).
Solar-log Solar-log 250 Firmware
Solar-log Solar-log 300 Firmware
Solar-log Solar-log 500 Firmware
Solar-log Solar-log 800e Firmware
Solar-log Solar-log 1000 Firmware
Solar-log Solar-log 1000 Pm\\+ Firmware
Solar-log Solar-log 1200 Firmware
Solar-log Solar-log 2000 Firmware
Solar-log Solar-log 50 Firmware
6.8
CVSSv2
CVE-2015-0209
Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL prior to 0.9.8zf, 1.0.0 prior to 1.0.0r, 1.0.1 prior to 1.0.1m, and 1.0.2 prior to 1.0.2a might allow remote malicious users to cause a denial of service (memory corruption and applica...
Openssl Openssl 1.0.1j
Openssl Openssl 1.0.0n
Openssl Openssl 1.0.0c
Openssl Openssl 1.0.0i
Openssl Openssl 1.0.1h
Openssl Openssl 1.0.0m
Openssl Openssl 1.0.1c
Openssl Openssl 1.0.1g
Openssl Openssl 1.0.0h
Openssl Openssl 1.0.0e
Openssl Openssl 1.0.0f
Openssl Openssl 1.0.0d
Openssl Openssl 1.0.0j
Openssl Openssl 1.0.0p
Openssl Openssl 1.0.1a
Openssl Openssl 1.0.0o
Openssl Openssl 1.0.1d
Openssl Openssl 1.0.0k
Openssl Openssl 1.0.1k
Openssl Openssl 1.0.0
Openssl Openssl 1.0.1b
Openssl Openssl 1.0.1e
10
CVSSv2
CVE-2014-9406
ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and previous versions has a default password of password for the admin account, which makes it easier for remote malicious users to obtain access via a request to home_loggedout.php.
Arris Touchstone Tg862g\\/ct Firmware 7.6.59s.ct
NA
CVE-2023-27389
Inadequate encryption strength vulnerability in CONPROSYS IoT Gateway products allows a remote authenticated attacker with an administrative privilege to apply a specially crafted Firmware update file, alter the information, cause a denial-of-service (DoS) condition, and/or execu...
Contec Cps-mg341-adsc1-111 Firmware
Contec Cps-mg341-adsc1-931 Firmware
Contec Cps-mg341g-adsc1-111 Firmware
Contec Cps-mg341g-adsc1-930 Firmware
Contec Cps-mg341g5-adsc1-931 Firmware
Contec Cps-mc341-adsc1-111 Firmware
Contec Cps-mc341-adsc1-931 Firmware
Contec Cps-mc341-adsc2-111 Firmware
Contec Cps-mc341g-adsc1-110 Firmware
Contec Cps-mc341q-adsc1-111 Firmware
Contec Cps-mc341-ds1-111 Firmware
Contec Cps-mc341-ds11-111 Firmware
Contec Cps-mc341-ds2-911 Firmware
Contec Cps-mc341-a1-111 Firmware
Contec Cps-mcs341-ds1-111 Firmware
Contec Cps-mcs341-ds1-131 Firmware
Contec Cps-mcs341g-ds1-130 Firmware
Contec Cps-mcs341g5-ds1-130 Firmware
Contec Cps-mcs341q-ds1-131 Firmware
2 Github repositories
5.4
CVSSv2
CVE-2019-3915
Authentication Bypass by Capture-replay vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows an unauthenticated attacker with adjacent network access to intercept and replay login requests to gain access to the administrative web interface.
Verizon Fios Quantum Gateway G1100 Firmware 02.01.00.05
5
CVSSv2
CVE-2019-3916
Information disclosure vulnerability in Verizon Fios Quantum Gateway (G1100) firmware version 02.01.00.05 allows an remote, unauthenticated malicious user to retrieve the value of the password salt by simply requesting an API URL in a web browser (e.g. /api).
Verizon Fios Quantum Gateway G1100 Firmware 02.01.00.05
7.8
CVSSv2
CVE-2014-9197
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware prior to 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote malicious users to obtain sensitive setup and configuration information via a direct request.
Schneider-electric Etg3000 Factorycast Hmi Gateway Firmware 1.60.2
Schneider-electric Tsxetg3000 -
Schneider-electric Tsxetg3010 -
Schneider-electric Tsxetg3021 -
Schneider-electric Tsxetg3022 -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »