Vulnerabilities > Phicomm

DATE CVE VULNERABILITY TITLE RISK
2022-03-10 CVE-2022-25213 Use of Hard-coded Credentials vulnerability in Phicomm products
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device.
low complexity
phicomm CWE-798
6.8
2022-03-10 CVE-2022-25214 Unspecified vulnerability in Phicomm products
Improper access control on the LocalClientList.asp interface allows an unauthenticated remote attacker to obtain sensitive information concerning devices on the local area network, including IP and MAC addresses.
network
high complexity
phicomm
7.4
2022-03-10 CVE-2022-25215 Unspecified vulnerability in Phicomm products
Improper access control on the LocalMACConfig.asp interface allows an unauthenticated remote attacker to add (or remove) client MAC addresses to (or from) a list of banned hosts.
network
low complexity
phicomm
5.3
2022-03-10 CVE-2022-25217 Use of Hard-coded Credentials vulnerability in Phicomm K2 Firmware and K3C Firmware
Use of a hard-coded cryptographic key pair by the telnetd_startup service allows an attacker on the local area network to obtain a root shell on the device over telnet.
local
low complexity
phicomm CWE-798
7.8
2022-03-10 CVE-2022-25218 Use of a Broken or Risky Cryptographic Algorithm vulnerability in Phicomm products
The use of the RSA algorithm without OAEP, or any other padding scheme, in telnetd_startup, allows an unauthenticated attacker on the local area network to achieve a significant degree of control over the "plaintext" to which an arbitrary blob of ciphertext will be decrypted by OpenSSL's RSA_public_decrypt() function.
network
high complexity
phicomm CWE-327
8.1
2022-03-10 CVE-2022-25219 Unspecified vulnerability in Phicomm products
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot.
local
low complexity
phicomm
8.4
2019-11-18 CVE-2019-19117 OS Command Injection vulnerability in Phicomm K2(Psg1218) Firmware 22.5.9.163
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.
network
low complexity
phicomm CWE-78
8.8
2017-07-20 CVE-2017-11495 Improper Input Validation vulnerability in Phicomm K2(Psg1218)-Firmware 22.5.11.5
PHICOMM K2(PSG1218) devices V22.5.11.5 and earlier allow unauthenticated remote code execution via a request to an unspecified ASP script; alternatively, the attacker can leverage unauthenticated access to this script to trigger a reboot via an ifType=reboot action.
network
low complexity
phicomm CWE-20
critical
9.8