Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless vulnerabilities and exploits
(subscribe to this query)
445
VMScore
CVE-2019-18659
The Wireless Emergency Alerts (WEA) protocol allows remote malicious users to spoof a Presidential Alert because cryptographic authentication is not used, as demonstrated by MessageIdentifier 4370 in LTE System Information Block 12 (aka SIB12). NOTE: testing inside an RF-isolated...
Ready Wireless Emergency Alerts -
445
VMScore
CVE-2021-28936
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
446
VMScore
CVE-2021-28937
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Acexy Wireless-n Wifi Repeater Firmware 28.08.06.1
NA
CVE-2023-30403
An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows malicious users to bypass login by connecting to the web app after a successful attempt by a legitimate user.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
NA
CVE-2023-30404
Aigital Wireless-N Repeater Mini_Router v0.131229 exists to contain a remote code execution (RCE) vulnerability via the sysCmd parameter in the formSysCmd function. This vulnerability is exploited via a crafted HTTP request.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
NA
CVE-2023-30405
A cross-site scripting (XSS) vulnerability in Aigital Wireless-N Repeater Mini_Router v0.131229 allows malicious users to execute arbitrary web scripts or HTML via a crafted payload injected into the wl_ssid parameter at /boafrm/formHomeWlanSetup.
Aigital Wireless-n Repeater Mini Router Firmware 0.131229
561
VMScore
CVE-2013-3474
The Web Administrator Interface on Cisco Wireless LAN Controller (WLC) devices allows remote authenticated users to cause a denial of service (device crash) by leveraging membership in the Full Manager managers group, Read Only managers group, or Lobby Ambassador managers group, ...
Cisco Wireless Lan Controller
409
VMScore
CVE-2018-3701
Improper directory permissions in the installer for Intel(R) PROSet/Wireless WiFi Software version 20.100 and previous versions may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Proset\\/wireless Wifi
890
VMScore
CVE-2017-11632
An issue exists on Wireless IP Camera 360 devices. A root account with a known SHA-512 password hash exists, which makes it easier for remote malicious users to obtain administrative access via a TELNET session.
- Wireless Ip Camera 360 -
427
VMScore
CVE-2020-17497
eapol.c in iNet wireless daemon (IWD) up to and including 1.8 allows malicious users to trigger a PTK reinstallation by retransmitting EAPOL Msg4/4.
Intel Inet Wireless Daemon
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-29895
blind SQL injection
CVE-2024-5064
CVE-2023-52677
CVE-2023-52682
CVE-2024-30051
CVE-2024-35849
remote attackers
remote
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »