Vulnerabilities > Greenpacket
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-12-31 | CVE-2018-14067 | Command Injection vulnerability in Greenpacket Dv-360 Firmware 2.10.14G1.0.6.1 Green Packet WiMax DV-360 2.10.14-g1.0.6.1 devices allow Command Injection, with unauthenticated remote command execution, via a crafted payload to the HTTPS port, because lighttpd listens on all network interfaces (including the external Internet) by default. | 10.0 |
2018-07-13 | CVE-2016-6552 | Credentials Management vulnerability in Greenpacket Dx-350 Firmware Green Packet DX-350 uses non-random default credentials of: root:wimax. | 10.0 |
2017-07-21 | CVE-2017-9980 | Command Injection vulnerability in Greenpacket Dx-350 Firmware 2.8.9.5G1.4.8Atheeb In Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, the "PING" (aka tag_ipPing) feature within the web interface allows performing command injection, via the "pip" parameter. | 7.5 |
2017-07-21 | CVE-2017-9932 | Use of Hard-coded Credentials vulnerability in Greenpacket Dx-350 Firmware 2.8.9.5G1.4.8Atheeb Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb has a default password of admin for the admin account. | 7.5 |
2017-07-21 | CVE-2017-9931 | Cross-site Scripting vulnerability in Greenpacket Dx-350 Firmware 2.8.9.5G1.4.8Atheeb Cross-Site Scripting (XSS) exists in Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by the action parameter to ajax.cgi. | 4.3 |
2017-07-21 | CVE-2017-9930 | Cross-Site Request Forgery (CSRF) vulnerability in Greenpacket Dx-350 Firmware 2.8.9.5G1.4.8Atheeb Cross-Site Request Forgery (CSRF) exists in Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by a request to ajax.cgi that enables UPnP. | 6.8 |
2017-06-20 | CVE-2017-3216 | Missing Authentication for Critical Function vulnerability in multiple products WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request. | 10.0 |