Chiyu-tech

Semac D2 N300 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 9.59%
  • Veröffentlicht 04.06.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:22

An authentication bypass in telnet server in BF-430 and BF431 232/422 TCP/IP Converter, BF-450M and SEMAC from CHIYU Technology Inc allows obtaining a privileged connection with the target device by supplying a specially malformed request and an atta...

Exploit
  • EPSS 2.87%
  • Veröffentlicht 04.06.2021 21:15:07
  • Zuletzt bearbeitet 21.11.2024 06:05:22

An open redirect vulnerability exists in BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, and SEMAC devices from CHIYU Technology that can be exploited by sending a link that has a specially crafted URL to convince the user to click on it.

Exploit
  • EPSS 1.16%
  • Veröffentlicht 01.06.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:03

An unauthenticated XSS vulnerability exists in several IoT devices from CHIYU Technology, including BF-630, BF-450M, BF-430, BF-431, BF631-W, BF830-W, Webpass, BF-MINI-W, and SEMAC due to a lack of sanitization when the HTTP 404 message is generated.

Exploit
  • EPSS 30.21%
  • Veröffentlicht 01.06.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:03

A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (> 32 bits) on...

Exploit
  • EPSS 3.81%
  • Veröffentlicht 01.06.2021 15:15:07
  • Zuletzt bearbeitet 21.11.2024 06:06:04

An XSS vulnerability exists in several IoT devices from CHIYU Technology, including SEMAC, Biosense, BF-630, BF-631, and Webpass due to a lack of sanitization on the component if.cgi - username parameter.