Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2018-3701
Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and previous versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Proset\\/wireless Wifi
5
CVSSv2
CVE-2019-18659
The Wireless Emergency Alerts (WEA) protocol allows remote malicious users to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated...
Ready Wireless Emergency Alerts -
7.2
CVSSv2
CVE-2020-25035
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
Ucopia Express Wireless Appliance
9
CVSSv2
CVE-2020-25036
UCOPIA Wi-Fi appliances 6.0.5 allow authenticated remote malicious users to escape the restricted administration shell CLI, and access a shell with admin user rights, via an unprotected less command.
Ucopia Ucopia Wireless Appliance
5
CVSSv2
CVE-2021-28936
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
5
CVSSv2
CVE-2021-28937
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
7.2
CVSSv2
CVE-2020-25037
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with admin user privileges via an escape from a restricted command.
Ucopia Ucopia Wireless Appliance
4.8
CVSSv2
CVE-2020-17497
eapol.c in iNet wireless daemon (IWD) up to and including 1.8 allows malicious users to trigger a PTK reinstallation by retransmitting EAPOL Msg4/4.
Intel Inet Wireless Daemon
6.5
CVSSv2
CVE-2007-2033
Unspecified vulnerability in Cisco Wireless Control System (WCS) prior to 4.0.81.0 allows remote authenticated users to read any configuration page by changing the group membership of user accounts, aka Bug ID CSCse78596.
Cisco Wireless Control System
9
CVSSv2
CVE-2007-2034
Unspecified vulnerability in Cisco Wireless Control System (WCS) prior to 4.0.87.0 allows remote authenticated users to gain the privileges of the SuperUsers group, and manage the application and its networks, related to the group membership of user accounts, aka Bug ID CSCsg0519...
Cisco Wireless Control System
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48700
CVE-2022-48689
CVE-2024-27956
CVE-2023-6363
SQL
NULL pointer dereference
CVE-2023-41830
CVE-2015-2051
arbitrary
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »