Page 18 of 98 results (0.007 seconds)

CVSS: 6.4EPSS: 3%CPEs: 1EXPL: 2

Linksys WAP55AG 1.07 allows remote attackers with access to an SNMP read only community string to gain access to read/write communtiy strings via a query for OID 1.3.6.1.4.1.3955.2.1.13.1.2. • https://www.exploit-db.com/exploits/23721 http://marc.info/?l=bugtraq&m=107712101324233&w=2 http://marc.info/?l=bugtraq&m=107730681012131&w=2 http://www.securityfocus.com/bid/9688 https://exchange.xforce.ibmcloud.com/vulnerabilities/15257 •

CVSS: 6.3EPSS: 1%CPEs: 1EXPL: 1

Buffer overflow in the system log viewer of Linksys BEFSX41 1.44.3 allows remote attackers to cause a denial of service via an HTTP request with a long Log_Page_Num variable. • http://securityreason.com/securityalert/3298 http://www.linksys.com/download/vertxt/befsx41_1453.txt http://www.securityfocus.com/archive/1/341309 http://www.securityfocus.com/bid/8834 https://exchange.xforce.ibmcloud.com/vulnerabilities/13436 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

Linksys EtherFast Cable/DSL BEFSR11, BEFSR41 and BEFSRU31 with the firmware 1.42.7 upgrade installed opens TCP port 5678 for remote administration even when the "Block WAN" and "Remote Admin" options are disabled, which allows remote attackers to gain access. • http://www.iss.net/security_center/static/9330.php http://www.securiteam.com/securitynews/5OP022K7GE.html http://www.securityfocus.com/bid/4987 •

CVSS: 5.0EPSS: 3%CPEs: 11EXPL: 3

Buffer overflow in the Embedded HTTP server, as used in (1) D-Link DI-804 4.68, Dl-704 V2.56b6, and Dl-704 V2.56b5 and (2) Linksys Etherfast BEFW11S4 Wireless AP + Cable/DSL Router 1.37.2 through 1.42.7 and Linksys WAP11 1.3 and 1.4, allows remote attackers to cause a denial of service (crash) via a long header, as demonstrated using the Host header. • https://www.exploit-db.com/exploits/21978 http://archives.neohapsis.com/archives/vulnwatch/2002-q4/0052.html http://www.iss.net/security_center/static/10537.php http://www.securityfocus.com/bid/6090 •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 2

GlobalSunTech Wireless Access Points (1) WISECOM GL2422AP-0T, and possibly OEM products such as (2) D-Link DWL-900AP+ B1 2.1 and 2.2, (3) ALLOY GL-2422AP-S, (4) EUSSO GL2422-AP, and (5) LINKSYS WAP11-V2.2, allow remote attackers to obtain sensitive information like WEP keys, the administrator password, and the MAC filter via a "getsearch" request to UDP port 27155. • http://online.securityfocus.com/archive/1/298432 http://www.iss.net/security_center/static/10536.php http://www.securityfocus.com/bid/6100 •