Greenpacket

Dx-350 Firmware

5 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.65%
  • Published 13.07.2018 20:29:00
  • Last modified 21.11.2024 02:56:20

Green Packet DX-350 uses non-random default credentials of: root:wimax. A remote network attacker can gain privileged access to a vulnerable device.

Exploit
  • EPSS 0.14%
  • Published 21.07.2017 06:29:00
  • Last modified 20.04.2025 01:37:25

Cross-Site Request Forgery (CSRF) exists in Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by a request to ajax.cgi that enables UPnP.

Exploit
  • EPSS 0.24%
  • Published 21.07.2017 06:29:00
  • Last modified 20.04.2025 01:37:25

Cross-Site Scripting (XSS) exists in Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by the action parameter to ajax.cgi.

Exploit
  • EPSS 0.44%
  • Published 21.07.2017 06:29:00
  • Last modified 20.04.2025 01:37:25

Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb has a default password of admin for the admin account.

Exploit
  • EPSS 4.4%
  • Published 21.07.2017 06:29:00
  • Last modified 20.04.2025 01:37:25

In Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, the "PING" (aka tag_ipPing) feature within the web interface allows performing command injection, via the "pip" parameter.