Vulnerabilities > Auerswald
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-12-13 | CVE-2021-40856 | Use of Incorrectly-Resolved Name or Reference vulnerability in Auerswald products Auerswald COMfortel 1400 IP and 2600 IP before 2.8G devices allow Authentication Bypass via the /about/../ substring. | 7.5 |
2021-12-13 | CVE-2021-40857 | Insufficiently Protected Credentials vulnerability in Auerswald products Auerswald COMpact 5500R devices before 8.2B allow Privilege Escalation via the passwd=1 substring. | 8.8 |
2021-12-13 | CVE-2021-40858 | Path Traversal vulnerability in Auerswald products Auerswald COMpact 5500R devices before 8.2B allow Arbitrary File Disclosure. | 4.9 |
2021-12-07 | CVE-2021-40859 | Unspecified vulnerability in Auerswald Compact 5500R Firmware 7.8A/8.0B Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device. | 9.8 |
2019-05-29 | CVE-2018-19978 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Auerswald Comfortel 1200 IP Firmware 3.4.4.110589 A buffer overflow vulnerability in the DHCP and PPPOE configuration interface of the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows a remote attacker (authenticated as simple user in the same network as the device) to trigger remote code execution via a POST request (ManufacturerName parameter) to the web server on the device. | 8.0 |
2019-05-29 | CVE-2018-19977 | OS Command Injection vulnerability in Auerswald Comfortel 1200 IP Firmware 3.4.4.110589 A command injection (missing input validation, escaping) in the ftp upgrade configuration interface on the Auerswald COMfort 1200 IP phone 3.4.4.1-10589 allows an authenticated remote attacker (simple user) -- in the same network as the device -- to trigger OS commands (like starting telnetd or opening a reverse shell) via a POST request to the web server. | 8.0 |