Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2019-18659
The Wireless Emergency Alerts (WEA) protocol allows remote malicious users to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated...
Ready Wireless Emergency Alerts -
4.6
CVSSv2
CVE-2018-3701
Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and previous versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Proset\\/wireless Wifi
5
CVSSv2
CVE-2021-28936
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
5
CVSSv2
CVE-2021-28937
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
7.2
CVSSv2
CVE-2020-25037
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with admin user privileges via an escape from a restricted command.
Ucopia Ucopia Wireless Appliance
NA
CVE-2023-30404
Aigital Wireless-N Repeater Mini_Router v0.131229 exists to contain a remote code execution (RCE) vulnerability via the sysCmd parameter in the formSysCmd function. This vulnerability is exploited via a crafted HTTP request.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
NA
CVE-2023-30405
A cross-site scripting (XSS) vulnerability in Aigital Wireless-N Repeater Mini_Router v0.131229 allows malicious users to execute arbitrary web scripts or HTML via a crafted payload injected into the wl_ssid parameter at /boafrm/formHomeWlanSetup.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
NA
CVE-2023-52161
The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) prior to 2.14 allows malicious users to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4...
Intel Inet Wireless Daemon
7.6
CVSSv2
CVE-2010-1184
The Microsoft wireless keyboard uses XOR encryption with a key derived from the MAC address, which makes it easier for remote malicious users to obtain keystroke information and inject arbitrary commands via a nearby wireless device, as demonstrated by Keykeriki 2.
Microsoft 27mhz Wireless Keyboard
7.2
CVSSv2
CVE-2020-25035
UCOPIA Wi-Fi appliances 6.0.5 allow arbitrary code execution with root privileges using chroothole_client's PHP call, a related issue to CVE-2017-11322.
Ucopia Express Wireless Appliance
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
authentication bypass
CVE-2024-30051
remote
CVE-2024-27954
CVE-2023-51483
CVE-2023-47782
SSRF
CVE-2024-24715
CVE-2023-52424
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »