Vulnerabilities > Systech > Syslink SL 1000 Modular Gateway Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2016-04-25 | CVE-2016-2333 | Cryptographic Issues vulnerability in Systech Syslink Sl-1000 Modular Gateway Firmware SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 use the same hardcoded encryption key across different customers' installations, which allows attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation. | 7.5 |
2016-04-25 | CVE-2016-2332 | Command Injection vulnerability in Systech Syslink Sl-1000 Modular Gateway Firmware flu.cgi in the web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 allows remote authenticated users to execute arbitrary commands via the 5066 (aka dnsmasq) parameter. | 8.8 |
2016-04-25 | CVE-2016-2331 | Credentials Management vulnerability in Systech Syslink Sl-1000 Modular Gateway Firmware The web interface on SysLINK SL-1000 Machine-to-Machine (M2M) Modular Gateway devices with firmware before 01A.8 has a default password, which makes it easier for remote attackers to obtain access via unspecified vectors. | 9.8 |