Vulnerabilities > Aztech

DATE CVE VULNERABILITY TITLE RISK
2023-02-22 CVE-2022-45599 Insufficiently Protected Credentials vulnerability in Aztech Wmb250Ac Firmware 0162020
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.
network
low complexity
aztech CWE-522
critical
9.8
2023-02-22 CVE-2022-45600 Command Injection vulnerability in Aztech Wmb250Ac Firmware 0162020
Aztech WMB250AC Mesh Routers Firmware Version 016 2020 devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.
network
low complexity
aztech CWE-77
8.8
2018-01-12 CVE-2014-6437 Information Exposure vulnerability in Aztech products
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file.
network
low complexity
aztech CWE-200
5.0
2018-01-12 CVE-2014-6436 Improper Authentication vulnerability in Aztech products
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.
network
low complexity
aztech CWE-287
critical
10.0
2018-01-12 CVE-2014-6435 Improper Authentication vulnerability in Aztech products
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.
network
low complexity
aztech CWE-287
5.0
2009-04-03 CVE-2008-6588 Credentials Management vulnerability in Aztech Adsl2/2+4-Port Router
Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote attackers to obtain access if this default is not changed.
network
low complexity
aztech CWE-255
critical
10.0
2009-03-30 CVE-2008-6554 OS Command Injection vulnerability in Aztech Adsl2/2+4-Port Router 3.7.0
cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string.
network
low complexity
aztech CWE-78
critical
10.0
2007-09-06 CVE-2007-4733 Permissions, Privileges, and Access Controls vulnerability in Aztech DSL 600Eu Router
The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077.
network
aztech CWE-264
critical
9.3