Westermo

L206-f2g Firmware

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 06.02.2024 22:16:14
  • Zuletzt bearbeitet 21.11.2024 08:26:35

An attacker with access to the web application with vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "dns.0.server" parameter.

  • EPSS 0.1%
  • Veröffentlicht 06.02.2024 22:16:14
  • Zuletzt bearbeitet 21.11.2024 08:27:16

A potential attacker with access to the Westermo Lynx device may be able to execute malicious code that could affect the correct functioning of the device.

  • EPSS 0.1%
  • Veröffentlicht 06.02.2024 22:16:13
  • Zuletzt bearbeitet 21.11.2024 08:18:51

An attacker with access to the Westermo Lynx web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "forward.0.domain" parameter.

  • EPSS 0.02%
  • Veröffentlicht 06.02.2024 22:16:13
  • Zuletzt bearbeitet 21.11.2024 08:19:41

An attacker with access to the network where the affected devices are located could maliciously actions to obtain, via a sniffer, sensitive information exchanged via TCP communications.

  • EPSS 0.07%
  • Veröffentlicht 06.02.2024 22:16:13
  • Zuletzt bearbeitet 21.11.2024 08:23:07

An attacker with access to the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "username" parameter in the SNMP configuration.

  • EPSS 0.04%
  • Veröffentlicht 06.02.2024 22:16:13
  • Zuletzt bearbeitet 21.11.2024 08:26:33

A potential attacker with access to the Westermo Lynx device would be able to execute malicious code that could affect the correct functioning of the device.

  • EPSS 0.1%
  • Veröffentlicht 06.02.2024 22:16:13
  • Zuletzt bearbeitet 21.11.2024 08:26:34

An attacker with access to the web application that has the vulnerable software could introduce arbitrary JavaScript by injecting a cross-site scripting payload into the "autorefresh" parameter.

  • EPSS 0.07%
  • Veröffentlicht 06.02.2024 22:16:12
  • Zuletzt bearbeitet 21.11.2024 08:13:52

The cross-site request forgery token in the request may be predictable or easily guessable allowing attackers to craft a malicious request, which could be triggered by a victim unknowingly. In a successful CSRF attack, the attacker could...