Sonicwall

Sma 200 Firmware

21 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warning
  • EPSS 3.74%
  • Published 08.12.2021 10:15:08
  • Last modified 21.11.2024 05:45:50

A buffer overflow vulnerability in SMA100 sonicfiles RAC_COPY_TO (RacNumber 36) method allows a remote unauthenticated attacker to potentially execute code as the 'nobody' user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and ...

Warning
  • EPSS 6.25%
  • Published 08.12.2021 10:15:08
  • Last modified 21.11.2024 05:45:50

A post-authentication remote command injection vulnerability in SonicWall SMA100 allows a remote authenticated attacker to execute OS system commands in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Warning
  • EPSS 1.23%
  • Published 08.12.2021 10:15:08
  • Last modified 21.11.2024 05:45:50

A Heap-based buffer overflow vulnerability in SonicWall SMA100 getBookmarks method allows a remote authenticated attacker to potentially execute code as the nobody user in the appliance. This vulnerability affected SMA 200, 210, 400, 410 and 500v app...

Warning
  • EPSS 1.2%
  • Published 08.12.2021 10:15:08
  • Last modified 21.11.2024 05:45:50

An unauthenticated remote attacker can use SMA 100 as an unintended proxy or intermediary undetectable proxy to bypass firewall rules. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Warning
  • EPSS 0.61%
  • Published 08.12.2021 10:15:08
  • Last modified 21.11.2024 05:45:50

An unauthenticated and remote adversary can consume all of the device's CPU due to crafted HTTP requests sent to SMA100 /fileshare/sonicfiles/sonicfiles resulting in a loop with unreachable exit condition. This vulnerability affected SMA 200, 210, 40...

Warning
  • EPSS 6.33%
  • Published 08.12.2021 10:15:07
  • Last modified 21.11.2024 05:45:50

A relative path traversal vulnerability in the SMA100 upload funtion allows a remote unauthenticated attacker to upload crafted web pages or files as a 'nobody' user. This vulnerability affected SMA 200, 210, 400, 410 and 500v appliances.

Warning Exploit
  • EPSS 58.57%
  • Published 08.12.2021 10:15:07
  • Last modified 05.09.2025 18:15:35

Improper neutralization of special elements in the SMA100 management interface '/cgi-bin/viewcert' POST http method allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user. This vulnerability affected SMA 200, 210, 400,...

Warning Exploit
  • EPSS 94.29%
  • Published 08.12.2021 10:15:07
  • Last modified 30.07.2025 18:58:44

A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to potentially execute code as a 'nobody' user in the appliance. This vulnerability affected SMA...

Warning Media report
  • EPSS 5.66%
  • Published 27.09.2021 18:15:08
  • Last modified 17.04.2025 18:01:46

Improper neutralization of special elements in the SMA100 management interface allows a remote authenticated attacker to inject arbitrary commands as a 'nobody' user which potentially leads to DoS.

Exploit
  • EPSS 5.44%
  • Published 27.09.2021 18:15:08
  • Last modified 21.11.2024 05:45:49

An improper access control vulnerability in SMA100 allows a remote unauthenticated attacker to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings.