Hughes

Hn7000s Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.27%
  • Veröffentlicht 26.01.2023 21:18:13
  • Zuletzt bearbeitet 28.03.2025 17:15:25

Cross Site Scripting (XSS) vulnerability in Hughes Network Systems Router Terminal for HX200 v8.3.1.14, HX90 v6.11.0.5, HX50L v6.10.0.18, HN9460 v8.2.0.48, and HN7000S v6.9.0.37, allows unauthenticated attackers to misuse frames, include JS/HTML code...

  • EPSS 0.24%
  • Veröffentlicht 13.07.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 03:01:19

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, are potentially vulnerable to improper input validation. The device's advanced status web page that is linked to from the basic status web page does not appear to p...

  • EPSS 0.21%
  • Veröffentlicht 13.07.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 03:01:19

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials. Access to the device's default telnet port (23) can be obtained through using one of a few default credentials shared among all devices...

  • EPSS 2.45%
  • Veröffentlicht 13.07.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 03:01:19

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, lacks authentication. An unauthenticated user may send an HTTP GET request to http://[ip]/com/gatewayreset or http://[ip]/cgi/reboot.bin to cause the modem to reboo...

  • EPSS 4.92%
  • Veröffentlicht 13.07.2018 20:29:01
  • Zuletzt bearbeitet 21.11.2024 03:01:19

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An...