Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2019-18659
The Wireless Emergency Alerts (WEA) protocol allows remote malicious users to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated...
Ready Wireless Emergency Alerts -
7.5
CVSSv3
CVE-2021-28936
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
7.5
CVSSv3
CVE-2021-28937
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
7.5
CVSSv3
CVE-2023-30403
An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows malicious users to bypass login by connecting to the web app after a successful attempt by a legitimate user.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
9.8
CVSSv3
CVE-2023-30404
Aigital Wireless-N Repeater Mini_Router v0.131229 exists to contain a remote code execution (RCE) vulnerability via the sysCmd parameter in the formSysCmd function. This vulnerability is exploited via a crafted HTTP request.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
5.4
CVSSv3
CVE-2023-30405
A cross-site scripting (XSS) vulnerability in Aigital Wireless-N Repeater Mini_Router v0.131229 allows malicious users to execute arbitrary web scripts or HTML via a crafted payload injected into the wl_ssid parameter at /boafrm/formHomeWlanSetup.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
NA
CVE-2013-3474
The Web Administrator Interface on Cisco Wireless LAN Controller (WLC) devices allows remote authenticated users to cause a denial of service (device crash) by leveraging membership in the Full Manager managers group, Read Only managers group, or Lobby Ambassador managers group, ...
Cisco Wireless Lan Controller
7.8
CVSSv3
CVE-2018-3701
Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and previous versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Proset\\/wireless Wifi
9.8
CVSSv3
CVE-2017-11632
An issue exists on Wireless IP Camera 360 devices. A root account with a known SHA-512 password hash exists, which makes it easier for remote malicious users to obtain administrative access via a TELNET session.
- Wireless Ip Camera 360 -
8.1
CVSSv3
CVE-2020-17497
eapol.c in iNet wireless daemon (IWD) up to and including 1.8 allows malicious users to trigger a PTK reinstallation by retransmitting EAPOL Msg4/4.
Intel Inet Wireless Daemon
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
6
7
8
9
10
NEXT »