Chiyu-tech

Bf-431 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 89.99%
  • Veröffentlicht 04.06.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:21

A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components.

Exploit
  • EPSS 79.61%
  • Veröffentlicht 04.06.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:21

Multiple storage XSS vulnerabilities were discovered on BF-430, BF-431 and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of sanitization of the input on the components man.cgi, if.cgi, dhcpc.cgi, ppp.cgi.

Exploit
  • EPSS 9.59%
  • Veröffentlicht 04.06.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:22

An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an atta...

Exploit
  • EPSS 2.87%
  • Veröffentlicht 04.06.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:22

An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it.

Exploit
  • EPSS 1.16%
  • Veröffentlicht 01.06.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:03

An unauthenticated XSS vulnerability exists in several IoT devices from CHIYU Technology, including BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, BF-MINI-W, and SEMAC due to a lack of sanitization when the HTTP 404 message is generated.