Filtered by vendor Fiberhome Subscriptions
Total 55 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2017-15647 1 Fiberhome 1 Routerfiberhome Firmware 2024-09-16 N/A
On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.
CVE-2017-16886 1 Fiberhome 2 Lm53q1, Lm53q1 Firmware 2024-08-05 N/A
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services via CSRF can result in an unauthorized change of username or password of the administrator of the portal.
CVE-2017-16885 1 Fiberhome 2 Lm53q1, Lm53q1 Firmware 2024-08-05 N/A
Improper Permissions Handling in the Portal on FiberHome LM53Q1 VH519R05C01S38 devices (intended for obtaining information about Internet Usage, Changing Passwords, etc.) allows remote attackers to look for the information without authenticating. The information includes Version of device, Firmware ID, Connected users to device along their MAC Addresses, etc.
CVE-2017-16887 1 Fiberhome 2 Lm53q1, Lm53q1 Firmware 2024-08-05 N/A
The portal on FiberHome Mobile WIFI Device Model LM53Q1 VH519R05C01S38 uses SOAP based web services in order to interact with the portal. Unauthorized Access to Web Services can result in disclosure of the WLAN key/password.
CVE-2017-14147 1 Fiberhome 2 Adsl An1020-25, Adsl An1020-25 Firmware 2024-08-05 N/A
An issue was discovered on FiberHome User End Routers Bearing Model Number AN1020-25 which could allow an attacker to easily restore a router to its factory settings by simply browsing to the link http://[Default-Router-IP]/restoreinfo.cgi & execute it. Due to improper authentication on this page, the software accepts the request hence allowing attacker to reset the router to its default configurations which later could allow attacker to login to router by using default username/password.
CVE-2017-5544 1 Fiberhome 6 Fengine 28f-s, Fengine 52f-s, Fengine 52t-s and 3 more 2024-08-05 5.9 Medium
An issue was discovered on FiberHome Fengine S5800 switches V210R240. An unauthorized attacker can access the device's SSH service, using a password cracking tool to establish SSH connections quickly. This will trigger an increase in the SSH login timeout (each of the login attempts will occupy a connection slot for a longer time). Once this occurs, legitimate login attempts via SSH/telnet will be refused, resulting in a denial of service; you must restart the device.
CVE-2018-9248 1 Fiberhome 2 Vdsl2 Modem Hg 150-ub, Vdsl2 Modem Hg 150-ub Firmware 2024-08-05 N/A
FiberHome VDSL2 Modem HG 150-UB devices allow authentication bypass via a "Cookie: Name=0admin" header.
CVE-2018-9249 1 Fiberhome 2 Vdsl2 Modem Hg 150-ub, Vdsl2 Modem Hg 150-ub Firmware 2024-08-05 N/A
FiberHome VDSL2 Modem HG 150-UB devices allow authentication bypass by ignoring the parent.location='login.html' JavaScript code in the response to an unauthenticated request.
CVE-2019-17187 1 Fiberhome 2 Hg2201t, Hg2201t Firmware 2024-08-05 7.5 High
/var/WEB-GUI/cgi-bin/downloadfile.cgi on FiberHome HG2201T 1.00.M5007_JS_201804 devices allows pre-authentication Directory Traversal for reading arbitrary files.
CVE-2019-17186 1 Fiberhome 2 Hg2201t, Hg2201t Firmware 2024-08-05 8.8 High
/var/WEB-GUI/cgi-bin/telnet.cgi on FiberHome HG2201T 1.00.M5007_JS_201804 devices allows pre-authentication remote code execution.
CVE-2021-42912 1 Fiberhome 12 Aan5506-04-g2g Firmware, An5506-01-a, An5506-01-a Firmware and 9 more 2024-08-04 8.8 High
FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command injection vulnerability. This vulnerability allows the attacker, once logged in, to send commands to the operating system as the root user via the ping diagnostic tool, bypassing the IP address field, and concatenating OS commands with a semicolon.
CVE-2021-41946 1 Fiberhome 2 Hg150-ub, Hg150-ub Firmware 2024-08-04 5.4 Medium
In FiberHome VDSL2 Modem HG150-Ub_V3.0, a stored cross-site scripting (XSS) vulnerability in Parental Control --> Access Time Restriction --> Username field, a user cannot delete the rule due to the XSS.
CVE-2021-27169 1 Fiberhome 2 An5506-04-fa, An5506-04-fa Firmware 2024-08-03 9.8 Critical
An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account.
CVE-2021-27166 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 9.8 Critical
An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon.
CVE-2021-27175 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 7.5 High
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions.
CVE-2021-27176 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 7.5 High
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions.
CVE-2021-27178 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 7.5 High
An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram.
CVE-2021-27163 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 9.8 Critical
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP.
CVE-2021-27174 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 7.5 High
An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions.
CVE-2021-27153 1 Fiberhome 2 Hg6245d, Hg6245d Firmware 2024-08-03 9.8 Critical
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded trueadmin / admintrue credentials for an ISP.