Genexis

Platinum 4410 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.09%
  • Veröffentlicht 04.12.2025 00:00:00
  • Zuletzt bearbeitet 23.12.2025 00:22:22

A vulnerability has been identified in Genexis Platinum P4410 router (Firmware P4410-V2–1.41) that allows a local network attacker to achieve Remote Code Execution (RCE) with root privileges. The issue occurs due to improper session invalidation afte...

Exploit
  • EPSS 0.1%
  • Veröffentlicht 10.11.2021 17:15:07
  • Zuletzt bearbeitet 21.11.2024 05:22:23

Cross site request forgery (CSRF) in Genexis Platinum 4410 V2-1.28, allows attackers to cause a denial of service by continuously restarting the router.

Exploit
  • EPSS 36.41%
  • Veröffentlicht 13.04.2021 06:15:12
  • Zuletzt bearbeitet 21.11.2024 06:00:30

Genexis PLATINUM 4410 2.1 P4410-V2-1.28 devices allow remote attackers to execute arbitrary code via shell metacharacters to sys_config_valid.xgi, as demonstrated by the sys_config_valid.xgi?exeshell=%60telnetd%20%26%60 URI.

Exploit
  • EPSS 3.35%
  • Veröffentlicht 17.11.2020 20:15:11
  • Zuletzt bearbeitet 21.11.2024 05:19:02

UPNP Service listening on port 5555 in Genexis Platinum 4410 Router V2.1 (P4410-V2–1.34H) has an action 'X_GetAccess' which leaks the credentials of 'admin', provided that the attacker is network adjacent.

Exploit
  • EPSS 0.34%
  • Veröffentlicht 16.09.2020 18:15:13
  • Zuletzt bearbeitet 21.11.2024 05:16:31

A specific router allows changing the Wi-Fi password remotely. Genexis Platinum 4410 V2-1.28, a compact router generally used at homes and offices was found to be vulnerable to Broken Access Control and CSRF which could be combined to remotely change...