Fortinet

Fcm-mb40 Firmware

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.42%
  • Published 08.07.2019 01:15:10
  • Last modified 21.11.2024 04:24:52

Dynacolor FCM-MB40 v1.2.0.0 use /etc/appWeb/appweb.pass to store administrative web-interface credentials in cleartext. These credentials can be retrieved via cgi-bin/getuserinfo.cgi?mode=info.

Exploit
  • EPSS 0.15%
  • Published 08.07.2019 01:15:10
  • Last modified 21.11.2024 04:24:52

Dynacolor FCM-MB40 v1.2.0.0 devices have CSRF in all scripts under cgi-bin/.

Exploit
  • EPSS 0.42%
  • Published 08.07.2019 01:15:10
  • Last modified 21.11.2024 04:24:52

/usr/sbin/default.sh and /usr/apache/htdocs/cgi-bin/admin/hardfactorydefault.cgi on Dynacolor FCM-MB40 v1.2.0.0 devices implement an incomplete factory-reset process. A backdoor can persist because neither system accounts nor the set of services is r...

Exploit
  • EPSS 3.34%
  • Published 08.07.2019 01:15:09
  • Last modified 21.11.2024 04:24:51

Dynacolor FCM-MB40 v1.2.0.0 devices allow remote attackers to execute arbitrary commands via a crafted parameter to a CGI script, as demonstrated by sed injection in cgi-bin/camctrl_save_profile.cgi (save parameter) and cgi-bin/ddns.cgi.

Exploit
  • EPSS 0.37%
  • Published 08.07.2019 01:15:09
  • Last modified 21.11.2024 04:24:51

Dynacolor FCM-MB40 v1.2.0.0 devices have a hard-coded SSL/TLS key that is used during an administrator's SSL conversation.