2 results (0.006 seconds)

CVSS: 9.8EPSS: 0%CPEs: 191EXPL: 1

Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website. • https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef • CWE-798: Use of Hard-coded Credentials •

CVSS: 5.4EPSS: 0%CPEs: 26EXPL: 1

Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field. Draytek VigorAP 1000C contiene una vulnerabilidad de tipo cross-site scripting (XSS) almacenada en el módulo RADIUS Setting - RADIUS Server Configuration. Esta vulnerabilidad permite a atacantes ejecutar scripts web o HTML arbitrarios por medio de una carga útil diseñada en el campo de entrada username • https://www.vulnerability-lab.com/get_content.php?id=2244 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •