Zyxel

Gs1900-48hp Firmware

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 28.12.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:11:42

A vulnerability in the TFTP client of Zyxel GS1900 series firmware, XGS1210 series firmware, and XGS1250 series firmware, which could allow an authenticated LAN user to execute arbitrary OS commands via the GUI of the vulnerable device.

  • EPSS 0.04%
  • Veröffentlicht 28.12.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:11:42

A vulnerability in the 'libsal.so' of the Zyxel GS1900 series firmware version 2.60 could allow an authenticated local user to execute arbitrary OS commands via a crafted function call.

  • EPSS 0.12%
  • Veröffentlicht 26.07.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:11:42

A vulnerability was found in the CGI program in Zyxel GS1900-8 firmware version V2.60, that did not properly sterilize packet contents and could allow an authenticated, local user to perform a cross-site scripting (XSS) attack via a crafted LLDP pack...

Exploit
  • EPSS 0.4%
  • Veröffentlicht 14.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when...

Exploit
  • EPSS 3.08%
  • Veröffentlicht 14.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 14.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware image contains encrypted passwords that are used to authenticate users wishing to access a diagnostics or password-recovery menu. Using the hardcoded cr...

Exploit
  • EPSS 0.29%
  • Veröffentlicht 14.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) ar...

Exploit
  • EPSS 0.38%
  • Veröffentlicht 14.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:29

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the passw...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 14.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:29:30

An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI appli...