Iball

Ib-wra150n Firmware

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.72%
  • Veröffentlicht 29.01.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:36

iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a hardcoded password of admin for the admin account, a hardcoded password of support for the support account, and a hardcoded password of user for the user account.

Exploit
  • EPSS 7.11%
  • Veröffentlicht 29.01.2018 18:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:36

iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices allow remote authenticated users to execute arbitrary OS commands via shell metacharacters in the ping test arguments on the Diagnostics page.

  • EPSS 50.79%
  • Veröffentlicht 17.09.2017 19:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An authentication bypass vulnerability on iBall Baton ADSL2+ Home Router FW_iB-LR7011A_1.0.2 devices potentially allows attackers to directly access administrative router settings by crafting URLs with a .cgi extension, as demonstrated by /info.cgi a...

  • EPSS 34.77%
  • Veröffentlicht 09.03.2017 09:59:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n devices are prone to an authentication bypass vulnerability that allows remote attackers to view and modify administrative router settings by reading the HTML source code of the pa...