Vulnerabilities > Iball > Critical
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-01-29 | CVE-2018-6387 | Use of Hard-coded Credentials vulnerability in Iball Ib-Wra150N Firmware 1.2.6 iBall iB-WRA150N 1.2.6 build 110401 Rel.47776n devices have a hardcoded password of admin for the admin account, a hardcoded password of support for the support account, and a hardcoded password of user for the user account. | 9.8 |
2017-09-17 | CVE-2017-14244 | Forced Browsing vulnerability in Iball Ib-Wra150N Firmware Fwiblr7011A1.0.2 An authentication bypass vulnerability on iBall Baton ADSL2+ Home Router FW_iB-LR7011A_1.0.2 devices potentially allows attackers to directly access administrative router settings by crafting URLs with a .cgi extension, as demonstrated by /info.cgi and /password.cgi. | 9.8 |
2017-03-09 | CVE-2017-6558 | Use of Hard-coded Credentials vulnerability in Iball Ib-Wra150N Firmware 1.2.6 iball Baton 150M iB-WRA150N v1 00000001 1.2.6 build 110401 Rel.47776n devices are prone to an authentication bypass vulnerability that allows remote attackers to view and modify administrative router settings by reading the HTML source code of the password.cgi file. | 9.8 |