CVE-2023-41031
- EPSS 0.26%
- Veröffentlicht 22.09.2023 17:15:14
- Zuletzt bearbeitet 21.11.2024 08:20:25
Command injection in homemng.htm in Juplink RX4-1500 versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows remote authenticated attackers to execute commands via specially crafted requests to the vulnerable endpoint.
CVE-2023-41029
- EPSS 0.18%
- Veröffentlicht 22.09.2023 17:15:10
- Zuletzt bearbeitet 21.11.2024 08:20:24
Command injection vulnerability in the homemng.htm endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.2, V1.0.3, V1.0.4, and V1.0.5 allows authenticated remote attackers to execute commands as root via specially crafted HTTP requests to ...
CVE-2023-41027
- EPSS 0.08%
- Veröffentlicht 22.09.2023 17:15:09
- Zuletzt bearbeitet 21.11.2024 08:20:24
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpo...
CVE-2023-41030
- EPSS 0.11%
- Veröffentlicht 18.09.2023 19:15:43
- Zuletzt bearbeitet 21.11.2024 08:20:25
Hard-coded credentials in Juplink RX4-1500 versions V1.0.2 through V1.0.5 allow unauthenticated attackers to log in to the web interface or telnet service as the 'user' user.
CVE-2023-41028
- EPSS 0.11%
- Veröffentlicht 23.08.2023 22:15:09
- Zuletzt bearbeitet 21.11.2024 08:20:24
A stack-based buffer overflow exists in Juplink RX4-1500, a WiFi router, in versions 1.0.2 through 1.0.5. An authenticated attacker can exploit this vulnerability to achieve code execution as root.
CVE-2020-8798
- EPSS 0.18%
- Veröffentlicht 23.04.2020 19:15:13
- Zuletzt bearbeitet 21.11.2024 05:39:27
httpd in Juplink RX4-1500 v1.0.3-v1.0.5 allows remote attackers to change or access router settings by connecting to the unauthenticated setup3.htm endpoint from the local network.
CVE-2020-8797
- EPSS 0.67%
- Veröffentlicht 23.04.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 05:39:27
Juplink RX4-1500 v1.0.3 allows remote attackers to gain root access to the Linux subsystem via an unsanitized exec call (aka Command Line Injection), if the undocumented telnetd service is enabled and the attacker can authenticate as admin from the l...