Vulnerabilities > Trivum

DATE CVE VULNERABILITY TITLE RISK
2018-07-17 CVE-2018-13862 Unspecified vulnerability in Trivum Webtouch Setup V9 Firmware 2.53
Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).
network
low complexity
trivum
critical
9.8
2018-07-17 CVE-2018-13861 Unspecified vulnerability in Trivum Webtouch Setup V9 Firmware 2.53
Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allows unauthorized remote attackers to reboot or execute other functions via the "/xml/system/control.xml" URL, using the GET request "?action=reboot" for example.
network
low complexity
trivum
critical
9.8
2018-07-17 CVE-2018-13860 Information Exposure vulnerability in Trivum C4 Professional Firmware 8.76
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional before V9.34 build 13381 - 12.07.18 allows unauthorized remote attackers to obtain sensitive information via the "/xml/menu/getObjectEditor.xml" URL, using a "?oid=systemSetup&id=_0" or "?oid=systemUsers&id=_0" GET request.
network
low complexity
trivum CWE-200
7.5
2018-07-17 CVE-2018-13859 Unspecified vulnerability in Trivum C4 Professional Firmware 8.76
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional before V9.34 build 13381 - 12.07.18, allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).
network
low complexity
trivum
critical
9.8
2018-07-17 CVE-2018-13858 Unspecified vulnerability in Trivum C4 Professional Firmware 8.76
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional allows unauthorized remote attackers to reboot or execute other functions via the "/xml/system/control.xml" URL, using the GET request "?action=reboot" for example.
network
low complexity
trivum
critical
9.8