Vulnerabilities > Twsz

DATE CVE VULNERABILITY TITLE RISK
2018-05-01 CVE-2018-9232 Improper Authentication vulnerability in Twsz Be126 Firmware
Due to the lack of firmware authentication in the upgrade process of T&W WIFI Repeater BE126 devices, an attacker can craft a malicious firmware and use it as an update.
local
low complexity
twsz CWE-287
7.8
2017-09-20 CVE-2017-8772 Use of Hard-coded Credentials vulnerability in Twsz Wifi Repeater Firmware
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1.
network
low complexity
twsz CWE-798
critical
9.8
2017-09-20 CVE-2017-8771 Use of Hard-coded Credentials vulnerability in Twsz Wifi Repeater Firmware
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root").
network
low complexity
twsz CWE-798
critical
9.8
2017-09-20 CVE-2017-8770 Information Exposure vulnerability in Twsz Wifi Repeater Firmware
There is LFD (local file disclosure) on BE126 WIFI repeater 1.0 devices that allows attackers to read the entire filesystem on the device via a crafted getpage parameter.
network
low complexity
twsz CWE-200
7.5
2017-09-07 CVE-2017-13713 OS Command Injection vulnerability in Twsz Wifi Repeater Firmware
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.
network
low complexity
twsz CWE-78
8.8