Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adsl vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2021-26709
D-Link DSL-320B-D1 devices through EU_1.25 are prone to multiple Stack-Based Buffer Overflows that allow unauthenticated remote malicious users to take over a device via the login.xgi user and pass parameters. NOTE: This vulnerability only affects products that are no longer supp...
D-link Dsl-320b-d1
9.8
CVSSv3
CVE-2014-6437
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote malicious users to obtain sensitive device configuration information via vectors involving the ROM file.
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
9.8
CVSSv3
CVE-2014-6436
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal lo...
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
9.8
CVSSv3
CVE-2017-14243
An authentication bypass vulnerability on UTStar WA3002G4 ADSL Broadband Modem WA3002G4-0021.01 devices allows malicious users to directly access administrative settings and obtain cleartext credentials from HTML source, as demonstrated by info.cgi, upload.cgi, backupsettings.cgi...
Utstar Wa3002g4 Firmware Wa3002g4-0021.01
1 EDB exploit
1 Github repository
9.8
CVSSv3
CVE-2017-14147
An issue exists on FiberHome User End Routers Bearing Model Number AN1020-25 which could allow an malicious user to easily restore a router to its factory settings by simply browsing to the link http://[Default-Router-IP]/restoreinfo.cgi & execute it. Due to improper authenti...
Fiberhome Adsl An1020-25 Firmware -
1 EDB exploit
8.8
CVSSv3
CVE-2020-12773
A security misconfiguration vulnerability exists in the SDK of some Realtek ADSL/PON Modem SoC firmware, which allows attackers using a default password to execute arbitrary commands remotely via the build-in network monitoring tool.
Realtek Adsl Router Soc Firmware -
8.8
CVSSv3
CVE-2015-7259
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow user accounts to have multiple valid username and password pairs, which allows remote authenticated users to login to a target account via any of its username and password pairs.
Zte Zxv10 W300 Firmware W300v2.1.0f Er7 Pe O57
Zte Zxv10 W300 Firmware W300v2.1.0h Er7 Pe O57
1 EDB exploit
8.8
CVSSv3
CVE-2015-7258
ZTE ADSL ZXV10 W300 modems W300V2.1.0f_ER7_PE_O57 and W300V2.1.0h_ER7_PE_O57 allow remote authenticated users to obtain user passwords by displaying user information in a Telnet connection.
Zte Zxv10 W300 Firmware W300v2.1.0f Er7 Pe O57
Zte Zxv10 W300 Firmware W300v2.1.0h Er7 Pe O57
1 EDB exploit
8.8
CVSSv3
CVE-2017-6738
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 up to and including 12.4 and 15.0 up to and including 15.6 and IOS XE 2.2 up to and including 3.17 contains multiple vulnerabilities that could allow an authenticated, remote malicious user to remotely exec...
Cisco Ios 15.5\\(2\\)t4
Cisco Ios 12.2\\(55\\)se1
Cisco Ios 12.2\\(50\\)se
Cisco Ios 15.0\\(2\\)ex
Cisco Ios 12.2\\(52\\)ey2a
Cisco Ios 15.0\\(1\\)xo
Cisco Ios 12.2\\(50\\)se5
Cisco Ios 15.0\\(1\\)ey2
Cisco Ios 15.0\\(2\\)xo
Cisco Ios 12.2\\(50\\)sq6
Cisco Ios 12.2\\(60\\)ez4
Cisco Ios 15.6\\(3\\)m1b
Cisco Ios 15.0\\(2\\)ek1
Cisco Ios 12.2\\(54\\)se
Cisco Ios 12.2\\(50\\)sq7
Cisco Ios 12.2\\(53\\)sg4
Cisco Ios 15.2\\(4\\)m5
Cisco Ios 15.2\\(4\\)m4
Cisco Ios 15.0\\(1\\)ey1
Cisco Ios 15.3\\(1\\)t4
Cisco Ios 15.0\\(2\\)sg6
Cisco Ios 15.0\\(2\\)sg
1 Article
8.8
CVSSv3
CVE-2017-6739
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 up to and including 12.4 and 15.0 up to and including 15.6 and IOS XE 2.2 up to and including 3.17 contains multiple vulnerabilities that could allow an authenticated, remote malicious user to remotely exec...
Cisco Ios 15.2\\(2\\)eb2
Cisco Ios 15.2\\(1\\)e1
Cisco Ios 15.2\\(5a\\)e1
Cisco Ios 15.4\\(3\\)m4
Cisco Ios 15.5\\(1\\)t4
Cisco Ios 15.2\\(5c\\)e
Cisco Ios 15.1\\(2\\)sg4
Cisco Ios 15.2\\(3\\)e1
Cisco Ios 15.0\\(2\\)sg7
Cisco Ios 15.5\\(1\\)t
Cisco Ios 15.4\\(1\\)t4
Cisco Ios 12.2\\(50\\)se1
Cisco Ios 15.2\\(4\\)e1
Cisco Ios 15.5\\(3\\)m3
Cisco Ios 15.2\\(4\\)m6a
Cisco Ios 15.2\\(1\\)e2
Cisco Ios 12.2\\(50\\)sg3
Cisco Ios 15.2\\(1\\)ey
Cisco Ios 12.2\\(53\\)sg7
Cisco Ios 12.2\\(60\\)ez8
Cisco Ios 15.5\\(1\\)t3
Cisco Ios 15.3\\(3\\)m3
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »