Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
ecoa riskterminator - vulnerabilities and exploits
(subscribe to this query)
890
VMScore
CVE-2021-41290
ECOA BAS controller suffers from an arbitrary file write and path traversal vulnerability. Using the POST parameters, unauthenticated attackers can remotely set arbitrary values for location and content type and gain the possibility to execute arbitrary code on the affected devic...
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
890
VMScore
CVE-2021-41299
ECOA BAS controller is vulnerable to hard-coded credentials within its Linux distribution image, thus remote attackers can obtain administrator’s privilege without logging in.
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
890
VMScore
CVE-2021-41301
ECOA BAS controller is vulnerable to configuration disclosure when direct object reference is made to the specific files using an HTTP GET request. This will enable the unauthenticated malicious user to remotely disclose sensitive information and help her in authentication bypass...
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
605
VMScore
CVE-2021-41295
ECOA BAS controller has a Cross-Site Request Forgery vulnerability, thus authenticated attacker can remotely place a forged request at a malicious web page and execute CRUD commands (GET, POST, PUT, DELETE) to perform arbitrary operations in the system.
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
578
VMScore
CVE-2021-41298
ECOA BAS controller is vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers with general user's privilege can remotely bypass authorization...
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
570
VMScore
CVE-2021-41292
ECOA BAS controller suffers from an authentication bypass vulnerability. An unauthenticated attacker through cookie poisoning can remotely bypass authentication and disclose sensitive information and circumvent physical access controls in smart homes and buildings and manipulate ...
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
570
VMScore
CVE-2021-41294
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files deletion. Using the specific GET parameter, unauthenticated attackers can remotely delete arbitrary files on the affected device and cause denial of service scenario.
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
445
VMScore
CVE-2021-41300
ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
445
VMScore
CVE-2021-41291
ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device.
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
445
VMScore
CVE-2021-41293
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.
Ecoa Ecs Router Controller-ecs Firmware -
Ecoa Riskbuster Firmware -
Ecoa Riskterminator -
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22120
CVE-2024-35921
CVE-2024-35874
brute force
CVE-2024-36080
unprivileged
CVE-2024-35917
IDOR
CVE-2024-4947
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »