Vulnerabilities > Zyxel
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-05-13 | CVE-2008-2167 | Cross-Site Scripting vulnerability in Zyxel Zywall 100 Cross-site scripting (XSS) vulnerability in ZyXEL ZyWALL 100 allows remote attackers to inject arbitrary web script or HTML via the Referer header, which is not properly handled in a 404 Error page. | 4.3 |
2008-03-26 | CVE-2008-1529 | Credentials Management vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers have a minimum password length for the admin account that is too small, which makes it easier for remote attackers to guess passwords via brute force methods. | 5.0 |
2008-03-26 | CVE-2008-1528 | Improper Authentication vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain authentication data by making direct HTTP requests and then reading the HTML source, as demonstrated by a request for (1) RemMagSNMP.html, which discloses SNMP communities; or (2) WLAN.html, which discloses WEP keys. | 4.0 |
2008-03-26 | CVE-2008-1527 | Cryptographic Issues vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack. | 7.5 |
2008-03-26 | CVE-2008-1526 | Use of Password Hash With Insufficient Computational Effort vulnerability in Zyxel products ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords. | 7.5 |
2008-03-26 | CVE-2008-1525 | Configuration vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos The default SNMP configuration on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has a Trusted Host value of 0.0.0.0, which allows remote attackers to send SNMP requests from any source IP address. | 5.0 |
2008-03-26 | CVE-2008-1524 | Configuration vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page. | 7.5 |
2008-03-26 | CVE-2008-1523 | Information Exposure vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain ISP and Dynamic DNS credentials by sending a direct request for (1) WAN.html, (2) wzPPPOE.html, and (3) rpDyDNS.html, and then reading the HTML source. | 5.0 |
2008-03-26 | CVE-2008-1522 | Configuration vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), have (1) "user" as their default password for the "user" account and (2) "1234" as their default password for the "admin" account, which makes it easier for remote attackers to obtain access. | 7.5 |
2008-03-26 | CVE-2008-1521 | Permissions, Privileges, and Access Controls vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to gain privileges by accessing administrative URIs, as demonstrated by rpSysAdmin.html. | 6.5 |