Vulnerabilities > Conceptronic > C54Apm
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-01-10 | CVE-2014-1408 | Credentials Management vulnerability in Conceptronic C54Apm and C54Apm Firmware The Conceptronic C54APM access point with runtime code 1.26 has a default password of admin for the admin account, which makes it easier for remote attackers to obtain access via an HTTP request, as demonstrated by stored XSS attacks. | 7.8 |
2014-01-10 | CVE-2014-1407 | Cross-Site Scripting vulnerability in Conceptronic C54Apm and C54Apm Firmware Multiple cross-site scripting (XSS) vulnerabilities on the Conceptronic C54APM access point with runtime code 1.26 allow remote attackers to inject arbitrary web script or HTML via (1) the submit-url parameter in a Refresh action to goform/formWlSiteSurvey or (2) the wlan-url parameter to goform/formWlanSetup. | 4.3 |
2014-01-10 | CVE-2014-1406 | Improper Input Validation vulnerability in Conceptronic C54Apm and C54Apm Firmware CRLF injection vulnerability in goform/formWlSiteSurvey on the Conceptronic C54APM access point with runtime code 1.26 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the submit-url parameter in a Refresh action. | 4.3 |
2014-01-10 | CVE-2014-1405 | Improper Input Validation vulnerability in Conceptronic C54Apm and C54Apm Firmware Multiple open redirect vulnerabilities on the Conceptronic C54APM access point with runtime code 1.26 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via (1) the submit-url parameter in a Refresh action to goform/formWlSiteSurvey or (2) the wlan-url parameter to goform/formWlanSetup. | 5.8 |