Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aztech vulnerabilities and exploits
(subscribe to this query)
505
VMScore
CVE-2014-6435
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote malicious users to cause a denial of service (WAN connectivity reset) via a direct request.
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
505
VMScore
CVE-2014-6437
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote malicious users to obtain sensitive device configuration information via vectors involving the ROM file.
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
1000
VMScore
CVE-2014-6436
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal lo...
Aztech Adsl Dsl5018en \\(1t1r\\) Firmware -
Aztech Dsl705e Firmware -
Aztech Dsl705eu Firmware -
1 EDB exploit
NA
CVE-2022-45599
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows malicious users to gain escalated privileges only when specific conditions regarding a given accounts hashed password.
Aztech Wmb250ac Firmware 016 2020
1 Github repository
NA
CVE-2022-45600
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal...
Aztech Wmb250ac Firmware 016 2020
1 Github repository
828
VMScore
CVE-2007-4733
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote malicious users to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packe...
Aztech Dsl 600eu Router
890
VMScore
CVE-2008-6588
Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote malicious users to obtain access if this default is not changed.
Aztech Adsl2\\/2\\+4-port Router -
890
VMScore
CVE-2008-6554
cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote malicious users to execute arbitrary commands via shell metacharacters in the query string.
Aztech Adsl2\\/2\\+4-port Router 3.7.0
505
VMScore
CVE-1999-0077
Predictable TCP sequence numbers allow spoofing.
Microsoft Windows Nt 4.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started