Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adsl vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2021-26709
D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote malicious users to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supp...
D-link Dsl-320b-d1
10
CVSSv2
CVE-2014-6436
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal lo...
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
10
CVSSv2
CVE-2017-14243
An authentication bypass vulnerability on UTStar WA3002G4 ADSL Broadband Modem WA3002G4-0021.01 devices allows malicious users to directly access administrative settings and obtain cleartext credentials from HTML source, as demonstrated by info.cgi, upload.cgi, backupsettings.cgi...
Utstar Wa3002g4 Firmware Wa3002g4-0021.01
1 EDB exploit
1 Github repository
10
CVSSv2
CVE-2014-8496
Digicom DG-5514T ADSL router with firmware 3.2 generates predictable session IDs, which allows remote malicious users to gain administrator privileges via a brute force session hijacking attack.
Digicom Dg-5514t Adsl Router Firmware 3.2
10
CVSSv2
CVE-2014-1982
The administrative interface in Allied Telesis AT-RG634A ADSL Broadband router 3.3+, iMG624A firmware 3.5, iMG616LH firmware 2.4, and iMG646BD firmware 3.5 allows remote malicious users to gain privileges and execute arbitrary commands via a direct request to cli.html.
Alliedtelesis Img646bd Firmware 3.5
Alliedtelesis Img646bd -
Alliedtelesis At-rg634a Firmware 3.3\\+
Alliedtelesis At-rg634a -
Alliedtelesis Img624a Firmware 3.5
Alliedtelesis Img624a -
Alliedtelesis Img616lh Firmware \\+2.4
Alliedtelesis Img616lh -
1 EDB exploit
10
CVSSv2
CVE-2008-6588
Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote malicious users to obtain access if this default is not changed.
Aztech Adsl2\\/2\\+4-port Router -
10
CVSSv2
CVE-2008-6554
cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote malicious users to execute arbitrary commands via shell metacharacters in the query string.
Aztech Adsl2\\/2\\+4-port Router 3.7.0
10
CVSSv2
CVE-2008-0229
The telnet service in LevelOne WBR-3460 4-Port ADSL 2/2+ Wireless Modem Router with firmware 1.00.11 and 1.00.12 does not require authentication, which allows remote attackers on the local or wireless network to obtain administrative access.
Level One Wbr-3460a 1.0.11
Level One Wbr-3460a 1.0.12
10
CVSSv2
CVE-2004-0477
Unknown vulnerability in 3Com OfficeConnect Remote 812 ADSL Router allows remote malicious users to bypass authentication via repeated attempts using any username and password. NOTE: this identifier was inadvertently re-used for another issue due to a typo; that issue was assigne...
3com 3cp4144
3com 3cp4144 1.1.9.4
10
CVSSv2
CVE-2004-0680
Zoom X3 ADSL modem has a terminal running on port 254 that can be accessed using the default HTML management password, even if the password has been changed for the HTTP interface, which could allow remote malicious users to gain unauthorized access.
Zoom Model 5560 X3 Ethernet Adsl Modem
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »