Zyxel

Gs1900-10hp Firmware

34 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.38%
  • Published 14.11.2019 21:15:11
  • Last modified 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the passw...

Exploit
  • EPSS 0.29%
  • Published 14.11.2019 21:15:11
  • Last modified 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) ar...

Exploit
  • EPSS 0.29%
  • Published 14.11.2019 21:15:11
  • Last modified 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cr...

Exploit
  • EPSS 3.08%
  • Published 14.11.2019 21:15:11
  • Last modified 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the...

Exploit
  • EPSS 0.4%
  • Published 14.11.2019 21:15:11
  • Last modified 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when...

  • EPSS 0.76%
  • Published 06.04.2016 23:59:13
  • Last modified 12.04.2025 10:46:40

The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673.

  • EPSS 0.33%
  • Published 06.04.2016 23:59:01
  • Last modified 12.04.2025 10:46:40

Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or devic...

  • EPSS 0.61%
  • Published 06.04.2016 23:59:00
  • Last modified 12.04.2025 10:46:40

Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSC...

  • EPSS 2.44%
  • Published 26.03.2016 01:59:04
  • Last modified 12.04.2025 10:46:40

Cisco IOS 15.3 and 15.4, Cisco IOS XE 3.8 through 3.11, and Cisco Unified Communications Manager allow remote attackers to cause a denial of service (device reload) via malformed SIP messages, aka Bug ID CSCuj23293.

  • EPSS 0.71%
  • Published 26.03.2016 01:59:03
  • Last modified 12.04.2025 10:46:40

The Smart Install client implementation in Cisco IOS 12.2, 15.0, and 15.2 and IOS XE 3.2 through 3.7 allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in a Smart Install packet, aka Bug ID CSCuv454...