Etictelecom

Remote Access Server Firmware

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 17.01.2025 17:15:11
  • Zuletzt bearbeitet 30.07.2025 17:13:00

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 are vulnerable to reflected cross site scripting in the appliance site name. The ETIC RAS web server saves the site name and then presents it to the administrators in a few dif...

  • EPSS 0.05%
  • Veröffentlicht 17.01.2025 17:15:11
  • Zuletzt bearbeitet 30.07.2025 17:11:39

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 expose clear text credentials in the web portal. An attacker can access the ETIC RAS web portal and view the HTML code, which is configured to be hidden, thus allowing a connec...

  • EPSS 0.14%
  • Veröffentlicht 17.01.2025 17:15:11
  • Zuletzt bearbeitet 30.07.2025 17:01:46

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 are vulnerable to reflected cross site scripting (XSS) attacks in the method parameter. The ETIC RAS web server uses dynamic pages that gets their input from the client side an...

  • EPSS 0.21%
  • Veröffentlicht 17.01.2025 17:15:11
  • Zuletzt bearbeitet 31.07.2025 18:20:55

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 are vulnerable to reflected cross site scripting (XSS) attacks in get view method under view parameter. The ETIC RAS web server uses dynamic pages that get their input from the...

  • EPSS 0.14%
  • Veröffentlicht 17.01.2025 17:15:10
  • Zuletzt bearbeitet 30.07.2025 17:15:26

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not r...

  • EPSS 0.03%
  • Veröffentlicht 23.08.2023 22:15:08
  • Zuletzt bearbeitet 21.11.2024 08:17:18

ETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.

  • EPSS 0.16%
  • Veröffentlicht 10.11.2022 22:15:15
  • Zuletzt bearbeitet 21.11.2024 07:22:21

All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files ...

  • EPSS 0.39%
  • Veröffentlicht 10.11.2022 22:15:15
  • Zuletzt bearbeitet 21.11.2024 07:23:28

All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the s...

  • EPSS 0.07%
  • Veröffentlicht 10.11.2022 22:15:14
  • Zuletzt bearbeitet 21.11.2024 07:20:04

All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device.