Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2010-2982
Cisco Unified Wireless Network (UWN) Solution 7.x prior to 7.0.98.0 allows remote malicious users to discover a group password via a series of SNMP requests, as demonstrated by an SNMP walk, aka Bug ID CSCtb74037.
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
NA
CVE-2005-3661
Dell TrueMobile 2300 Wireless Broadband Router running firmware 3.0.0.8 and 5.1.1.6, and possibly other versions, allows remote malicious users to reset authentication credentials, then change configuration or firmware, via a direct request to apply.cgi with the Page parameter se...
Dell Truemobile 2300 Wireless Broadband Router 3.0.0.8
Dell Truemobile 2300 Wireless Broadband Router 5.1.1.6
NA
CVE-2010-2976
The controller in Cisco Unified Wireless Network (UWN) Solution 7.x up to and including 7.0.98.0 has (1) a default SNMP read-only community of public, (2) a default SNMP read-write community of private, and a value of "default" for the (3) SNMP v3 username, (4) SNMP v3 ...
Cisco Unified Wireless Network Solution Software 7.0.98.0
Cisco Unified Wireless Network Solution Software 7.0
NA
CVE-2015-0679
The web-authentication functionality on Cisco Wireless LAN Controller (WLC) devices 7.3(103.8) and 7.4(110.0) allows remote malicious users to cause a denial of service (device reload) via a malformed password, aka Bug ID CSCui57980.
Cisco Wireless Lan Controller Software 7.4\\(110.0\\)
Cisco Wireless Lan Controller Software 7.3\\(103.8\\)
7.5
CVSSv3
CVE-2016-1325
The administration interface on Cisco DPC3939B and DPC3941 devices allows remote malicious users to obtain sensitive information via a crafted HTTP request, aka Bug ID CSCus49506.
Cisco Dpc3939 Wireless Residential Voice Gateway Firmware 130514acmcst Base
7.8
CVSSv3
CVE-2021-37409
Improper access control for some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi products may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1690 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
8.8
CVSSv3
CVE-2016-1000213
Ruckus Wireless H500 web management interface CSRF
Ruckus Wireless H500 -
8.8
CVSSv3
CVE-2016-1000216
Ruckus Wireless H500 web management interface authenticated command injection
Ruckus Wireless H500 -
5.3
CVSSv3
CVE-2016-1000214
Ruckus Wireless H500 web management interface authentication bypass
Ruckus Wireless H500 -
7.5
CVSSv3
CVE-2016-1000215
Ruckus Wireless H500 web management interface denial of service
Ruckus Wireless H500 -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »