Filtered by vendor Zyxel
Subscriptions
Total
276 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-29299 | 1 Zyxel | 7 Atp, Nsg, Nsg Firmware and 4 more | 2024-08-04 | 7.2 High |
Certain Zyxel products allow command injection by an admin via an input string to chg_exp_pwd during a password-change action. This affects VPN On-premise before ZLD V4.39 week38, VPN Orchestrator before SD-OS V10.03 week32, USG before ZLD V4.39 week38, USG FLEX before ZLD V4.55 week38, ATP before ZLD V4.55 week38, and NSG before 1.33 patch 4. | ||||
CVE-2020-28899 | 1 Zyxel | 6 Lte4506-m606, Lte4506-m606 Firmware, Lte7460-m608 and 3 more | 2024-08-04 | 9.1 Critical |
The Web CGI Script on ZyXEL LTE4506-M606 V1.00(ABDO.2)C0 devices does not require authentication, which allows remote unauthenticated attackers (via crafted JSON action data to /cgi-bin/gui.cgi) to use all features provided by the router. Examples: change the router password, retrieve the Wi-Fi passphrase, send an SMS message, or modify the IP forwarding to access the internal network. | ||||
CVE-2020-25014 | 1 Zyxel | 52 Access Points Firmware, Nwa110ax, Nwa1123-ac Hd and 49 more | 2024-08-04 | 9.8 Critical |
A stack-based buffer overflow in fbwifi_continue.cgi on Zyxel UTM and VPN series of gateways running firmware version V4.30 through to V4.55 allows remote unauthenticated attackers to execute arbitrary code via a crafted http packet. | ||||
CVE-2020-24355 | 1 Zyxel | 2 Vmg5313-b30b, Vmg5313-b30b Firmware | 2024-08-04 | 9.8 Critical |
Zyxel VMG5313-B30B router on firmware 5.13(ABCJ.6)b3_1127, and possibly older versions of firmware are affected by insecure permissions which allows regular and other users to create new users with elevated privileges. This is done by changing "FirstIndex" field in JSON that is POST-ed during account creation. Similar may also be possible with account deletion. | ||||
CVE-2020-24354 | 1 Zyxel | 2 Vmg5313-b30b, Vmg5313-b30b Firmware | 2024-08-04 | 8.8 High |
Zyxel VMG5313-B30B router on firmware 5.13(ABCJ.6)b3_1127, and possibly older versions of firmware are affected by shell injection. | ||||
CVE-2020-20183 | 1 Zyxel | 2 P1302-t10 V3, P1302-t10 V3 Firmware | 2024-08-04 | 7.5 High |
Insecure direct object reference vulnerability in Zyxel’s P1302-T10 v3 with firmware version 2.00(ABBX.3) and earlier allows attackers to gain privileges and access certain admin pages. | ||||
CVE-2020-15340 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 7.5 High |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded opt/axess/AXAssets/default_axess/axess/TR69/Handlers/turbolink/sshkeys/id_rsa SSH key. | ||||
CVE-2020-15335 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 7.5 High |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has no authentication for /registerCpe requests. | ||||
CVE-2020-15348 | 1 Zyxel | 1 Cloud Cnm Secumanager | 2024-08-04 | 9.8 Critical |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows use of live/CPEManager/AXCampaignManager/delete_cpes_by_ids?cpe_ids= for eval injection of Python code. | ||||
CVE-2020-15334 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.3 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows escape-sequence injection into the /var/log/axxmpp.log file. | ||||
CVE-2020-15328 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.3 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak /opt/axess/var/blobstorage/ permissions. | ||||
CVE-2020-15320 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 9.8 Critical |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the axiros password for the root account. | ||||
CVE-2020-15344 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.3 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_get_user_id_and_key API. | ||||
CVE-2020-15332 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 9.8 Critical |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has weak /opt/axess/etc/default/axess permissions. | ||||
CVE-2020-15338 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.3 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a "Use of GET Request Method With Sensitive Query Strings" issue for /cnr requests. | ||||
CVE-2020-15341 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 7.5 High |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated update_all_realm_license API. | ||||
CVE-2020-15333 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.3 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 allows attackers to discover accounts via MySQL "select * from Administrator_users" and "select * from Users_users" requests. | ||||
CVE-2020-15321 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 9.8 Critical |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has the axzyxel password for the livedbuser account. | ||||
CVE-2020-15314 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.9 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has a hardcoded RSA SSH key for the root account. | ||||
CVE-2020-15345 | 1 Zyxel | 1 Cloudcnm Secumanager | 2024-08-04 | 5.3 Medium |
Zyxel CloudCNM SecuManager 3.1.0 and 3.1.1 has an unauthenticated zy_get_instances_for_update API. |