2 results (0.002 seconds)

CVSS: 10.0EPSS: 0%CPEs: 191EXPL: 1

01 Jun 2023 — Draytek Vigor Routers firmware versions below 3.9.6/4.2.4, Access Points firmware versions below v1.4.0, Switches firmware versions below 2.6.7, and Myvigor firmware versions below 2.3.2 were discovered to use hardcoded encryption keys which allows attackers to bind any affected device to their own account. Attackers are then able to create WCF and DrayDDNS licenses and synchronize them from the website. • https://gist.github.com/Ji4n1ng/6d028709d39458f5ab95b3ea211225ef • CWE-798: Use of Hard-coded Credentials •

CVSS: 5.4EPSS: 0%CPEs: 26EXPL: 1

22 Oct 2021 — Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field. Draytek VigorAP 1000C contiene una vulnerabilidad de tipo cross-site scripting (XSS) almacenada en el módulo RADIUS Setting - RADIUS Server Configuration. Esta vulnerabilidad permite a atacantes ejecutar scripts web o HTML arbitrarios por medi... • https://www.vulnerability-lab.com/get_content.php?id=2244 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •