Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adsl firmware vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2007-6709
The Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware has "admin" as its default password for the "admin" account, which makes it easier for remote malicious users to obtain access.
Linksys Wag54gs
NA
CVE-2008-0229
The telnet service in LevelOne WBR-3460 4-Port ADSL 2/2+ Wireless Modem Router with firmware 1.00.11 and 1.00.12 does not require authentication, which allows remote attackers on the local or wireless network to obtain administrative access.
Level One Wbr-3460a 1.0.11
Level One Wbr-3460a 1.0.12
NA
CVE-2007-3574
Multiple cross-site scripting (XSS) vulnerabilities in setup.cgi on the Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.00.06 firmware allow remote malicious users to inject arbitrary web script or HTML via the (1) c4_trap_ip_, (2) devname, (3) snmp_getcomm, or (4) snmp_setc...
Linksys Wag54gs 1.00.06
1 EDB exploit
NA
CVE-2006-4765
NETGEAR DG834GT Wireless ADSL router running firmware 1.01.28 allows malicious users to cause a denial of service (device hang) via a long string in the username field in the login window.
Netgear Dg834gt 1.01.28
NA
CVE-2006-3929
Cross-site scripting (XSS) vulnerability in the Forms/rpSysAdmin script on the Zyxel Prestige 660H-61 ADSL Router running firmware 3.40(PT.0)b32 allows remote malicious users to inject arbitrary web script or HTML via hex-encoded values in the a parameter.
Zyxel Prestige 660h-61 Firmware 3.40 Pt.0 B32
1 EDB exploit
NA
CVE-2006-3561
BT Voyager 2091 Wireless firmware 2.21.05.08m_A2pB018c1.d16d and previous versions, and 3.01m and previous versions, allow remote malicious users to bypass the authentication process and gain sensitive information, such as configuration information via (1) /btvoyager_getconfig.sh...
Bt Voyager 2091 Wireless Adsl Router
1 EDB exploit
NA
CVE-2005-2585
Mentor ADSL-FR4II router running firmware 2.00.0111 allows remote malicious users to cause a denial of service (active TCP connections state table consumption) via a large number of connections, such as a port scan.
Mentor Adslfr4ii 2.00.0111
NA
CVE-2005-2583
Mentor ADSL-FR4II router running firmware 2.00.0111 has an undocumented web server running on TCP port 5678, which allows local users to gain access.
Mentor Adslfr4ii 2.00.0111
NA
CVE-2005-2586
Mentor ADSL-FR4II router running firmware 2.00.0111 stores the web administration password in cleartext in the backup configuration file, which allows local users to obtain sensitive information.
Mentor Adslfr4ii 2.00.0111
NA
CVE-2005-2584
The web administration interface in Mentor ADSL-FR4II router running firmware 2.00.0111 does not set a default password, which allows local users to gain access.
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »