Amino

Aria7xx Firmware

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Published 30.12.2020 00:15:12
  • Last modified 21.11.2024 04:54:57

Use of a Hard-coded Password in VNCserver in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows local attackers to view and interact with the video output of the device.

Exploit
  • EPSS 9.51%
  • Published 30.12.2020 00:15:12
  • Last modified 21.11.2024 04:54:58

Command Injection in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows authenticated remote attackers to execute arbitrary commands with root user privileges.

Exploit
  • EPSS 3.13%
  • Published 30.12.2020 00:15:12
  • Last modified 21.11.2024 04:54:58

Command Injection in the CPE WAN Management Protocol (CWMP) registration in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows man-in-the-middle attackers to execute arbitrary commands ...

Exploit
  • EPSS 3.96%
  • Published 29.12.2020 23:15:12
  • Last modified 21.11.2024 04:54:57

Use of Hard-coded Credentials in EntoneWebEngine in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series and Kami7B allows remote attackers to retrieve and modify the device settings.

Exploit
  • EPSS 0.46%
  • Published 29.12.2020 23:15:12
  • Last modified 21.11.2024 04:54:58

Because of hard-coded SSH keys for the root user in Amino Communications AK45x series, AK5xx series, AK65x series, Aria6xx series, Aria7/AK7Xx series, Kami7B, an attacker may remotely log in through SSH.