Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
- EPSS 6.08%
- Veröffentlicht 11.12.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:05:24
Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.
5.9
CVE-2020-15023
- EPSS 0.34%
- Veröffentlicht 11.12.2020 16:15:11
- Zuletzt bearbeitet 21.11.2024 05:04:38
Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed) ...
- EPSS 0.66%
- Veröffentlicht 10.12.2020 23:15:12
- Zuletzt bearbeitet 21.11.2024 05:19:31
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
1