CVE-2026-22323
- EPSS 0.04%
- Veröffentlicht 18.03.2026 07:35:09
- Zuletzt bearbeitet 18.03.2026 14:52:44
A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently...
CVE-2026-22322
- EPSS 0.08%
- Veröffentlicht 18.03.2026 07:34:49
- Zuletzt bearbeitet 18.03.2026 14:52:44
A stored cross‑site scripting (XSS) vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to create a trunk entry containing malicious HTML/JavaScript code. When the affected page is viewed, the injec...
CVE-2026-22321
- EPSS 0.04%
- Veröffentlicht 18.03.2026 07:34:36
- Zuletzt bearbeitet 18.03.2026 14:52:44
A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session...
CVE-2026-22320
- EPSS 0.04%
- Veröffentlicht 18.03.2026 07:34:23
- Zuletzt bearbeitet 18.03.2026 14:52:44
A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corru...
CVE-2026-22319
- EPSS 0.04%
- Veröffentlicht 18.03.2026 07:34:07
- Zuletzt bearbeitet 18.03.2026 14:52:44
A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack.
CVE-2026-22318
- EPSS 0.04%
- Veröffentlicht 18.03.2026 07:33:55
- Zuletzt bearbeitet 18.03.2026 14:52:44
A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack.
CVE-2026-22317
- EPSS 0.06%
- Veröffentlicht 18.03.2026 07:33:44
- Zuletzt bearbeitet 18.03.2026 14:52:44
A command injection vulnerability in the device’s Root CA certificate transfer workflow allows a high-privileged attacker to send crafted HTTP POST requests that result in arbitrary command execution on the underlying Linux OS with root privileges.
CVE-2026-22316
- EPSS 0.09%
- Veröffentlicht 18.03.2026 07:33:31
- Zuletzt bearbeitet 18.03.2026 14:52:44
A remote attacker with user privileges for the webUI can use the setting of the TFTP Filename with a POST Request to trigger a stack-based Buffer Overflow, resulting in a DoS attack.
CVE-2025-41693
- EPSS 0.31%
- Veröffentlicht 09.12.2025 08:13:47
- Zuletzt bearbeitet 19.12.2025 18:11:57
A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.
CVE-2025-41696
- EPSS 0.02%
- Veröffentlicht 09.12.2025 08:13:22
- Zuletzt bearbeitet 19.12.2025 18:12:06
An attacker can use an undocumented UART port on the PCB as a side-channel with the user hardcoded credentials obtained from CVE-2025-41692 to gain read access to parts of the filesystem of the device.