Phicomm

K2p Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 1.52%
  • Veröffentlicht 10.03.2022 17:47:02
  • Zuletzt bearbeitet 21.11.2024 06:51:49

The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of cip...

Exploit
  • EPSS 0.15%
  • Veröffentlicht 10.03.2022 17:47:02
  • Zuletzt bearbeitet 21.11.2024 06:51:49

A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists up...

Exploit
  • EPSS 1.25%
  • Veröffentlicht 10.03.2022 17:47:01
  • Zuletzt bearbeitet 21.11.2024 06:51:49

Improper access control on the LocalClientList.asp interface allows an unauthenticated remote attacker to obtain sensitive information concerning devices on the local area network, including IP and MAC addresses. Improper access control on the wirele...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 10.03.2022 17:47:01
  • Zuletzt bearbeitet 21.11.2024 06:51:49

Improper access control on the LocalMACConfig.asp interface allows an unauthenticated remote attacker to add (or remove) client MAC addresses to (or from) a list of banned hosts. Clients with those MAC addresses are then prevented from accessing eith...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 10.03.2022 17:47:00
  • Zuletzt bearbeitet 21.11.2024 06:51:49

Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS she...