Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
adsl firmware vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2014-8496
Digicom DG-5514T ADSL router with firmware 3.2 generates predictable session IDs, which allows remote malicious users to gain administrator privileges via a brute force session hijacking attack.
Digicom Dg-5514t Adsl Router Firmware 3.2
10
CVSSv2
CVE-2014-1982
The administrative interface in Allied Telesis AT-RG634A ADSL Broadband router 3.3+, iMG624A firmware 3.5, iMG616LH firmware 2.4, and iMG646BD firmware 3.5 allows remote malicious users to gain privileges and execute arbitrary commands via a direct request to cli.html.
Alliedtelesis Img646bd Firmware 3.5
Alliedtelesis Img646bd -
Alliedtelesis At-rg634a Firmware 3.3\\+
Alliedtelesis At-rg634a -
Alliedtelesis Img624a Firmware 3.5
Alliedtelesis Img624a -
Alliedtelesis Img616lh Firmware \\+2.4
Alliedtelesis Img616lh -
1 EDB exploit
10
CVSSv2
CVE-2008-0229
The telnet service in LevelOne WBR-3460 4-Port ADSL 2/2+ Wireless Modem Router with firmware 1.00.11 and 1.00.12 does not require authentication, which allows remote attackers on the local or wireless network to obtain administrative access.
Level One Wbr-3460a 1.0.11
Level One Wbr-3460a 1.0.12
10
CVSSv2
CVE-2002-2133
Telindus 1100 ASDL router running firmware 6.0.x uses weak encryption for UDP session traffic, which allows remote malicious users to gain unauthorized access by sniffing and decrypting the administrative password.
Telindus 1120 Adsl Router 6.0.21b Firmware
7.6
CVSSv2
CVE-2013-2271
The D-Link DSL-2740B Gateway with firmware EU_1.0, when an active administrator session exists, allows remote malicious users to bypass authentication and gain administrator access via a request to login.cgi.
Dlink Dsl-2740b Firmware -
Dlink Dsl-2740b -
1 EDB exploit
7.5
CVSSv2
CVE-2007-6709
The Cisco Linksys WAG54GS Wireless-G ADSL Gateway with 1.01.03 and previous versions firmware has "admin" as its default password for the "admin" account, which makes it easier for remote malicious users to obtain access.
Linksys Wag54gs
7.5
CVSSv2
CVE-2005-2583
Mentor ADSL-FR4II router running firmware 2.00.0111 has an undocumented web server running on TCP port 5678, which allows local users to gain access.
Mentor Adslfr4ii 2.00.0111
7.5
CVSSv2
CVE-2004-0641
Thomson SpeedTouch 510 ADSL Router with firmware GV8BAA3.270, and possibly earlier versions, generates predictable TCP Initial Sequence Numbers (ISNs), which allows remote malicious users to spoof or hijack TCP connections.
Thomson Speedtouch 510 Adsl Router
1 EDB exploit
7.5
CVSSv2
CVE-2002-0888
3Com OfficeConnect Remote 812 ADSL Router, firmware 1.1.9 and 1.1.7, allows remote malicious users to bypass port access restrictions by connecting to an approved port and quickly connecting to the desired port, which is allowed by the router.
3com 3cp4144 1.1.9
3com 3cp4144 1.1.7
7.5
CVSSv2
CVE-2001-1484
Alcatel ADSL modems allow remote malicious users to access the Trivial File Transfer Protocol (TFTP) to modify firmware and configuration via a bounce attack from a system on the local area network (LAN) side, which is allowed to access TFTP without authentication.
Alcatel Speed Touch Adsl Modem Home
Alcatel Adsl Modem 1000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
validation
CVE-2012-1823
malicious code
CVE-2024-5770
CVE-2023-45866
CVE-2024-35687
local users
CVE-2024-31246
CVE-2024-35730
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »