CVE-2022-44354
https://notcve.org/view.php?id=CVE-2022-44354
SolarView Compact 4.0 and 5.0 is vulnerable to Unrestricted File Upload via a crafted php file. SolarView Compact 4.0 y 5.0 es vulnerable a la carga de archivos sin restricciones a través de un archivo php manipulado. • https://github.com/strik3r0x1/Vulns/blob/main/Unrestricted%20File%20Upload_%20SolarView%20Compact%204.0%2C5.0.md • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2022-44355
https://notcve.org/view.php?id=CVE-2022-44355
SolarView Compact 7.0 is vulnerable to Cross-site Scripting (XSS) via /network_test.php. SolarView Compact 7.0 es vulnerable a Cross-site Scripting (XSS) a través de /network_test.php. • https://github.com/strik3r0x1/Vulns/blob/main/SolarView%20Compact%20XSS%20up%20to%207.0.md • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-40881
https://notcve.org/view.php?id=CVE-2022-40881
SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php Se descubrió que SolarView Compact 6.00 contiene una vulnerabilidad de inyección de comandos a través de network_test.php • https://github.com/yilin1203/CVE-2022-40881 https://github.com/Timorlover/SolarView_Compact_6.0_rce_via_network_test.php • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2022-36159
https://notcve.org/view.php?id=CVE-2022-36159
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware. Se ha detectado que Contec FXA3200 versiones 1.13 y anteriores, contienen una contraseña hash embebida para root almacenada en el componente /etc/shadow. Como la fuerza de la contraseña es débil, puede ser descifrada en pocos minutos. • https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 https://jvn.jp/en/vu/JVNVU98305100 https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section • CWE-798: Use of Hard-coded Credentials •
CVE-2022-36158
https://notcve.org/view.php?id=CVE-2022-36158
Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi). Contec FXA3200 versiones 1.13.00 y anteriores, sufre de permisos no seguros en la interfaz del Wireless LAN Manager, lo que permite a actores maliciosos ejecutar comandos de Linux con privilegios de root por medio de una página web oculta (/usr/www/ja/mnt_cmd.cgi). • https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 https://jvn.jp/en/vu/JVNVU98305100 https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section • CWE-425: Direct Request ('Forced Browsing') •