Router Vulnerabilità

Sequenza temporale

L'anno scorso

Versione

8.6.0.031
4.1.1.025
4.1.1.125
4.1.1.225
4.1.1.325

Contromisure

Official Fix268
Temporary Fix0
Workaround65
Unavailable24
Not Defined219

Sfruttabilità

High28
Functional3
Proof-of-Concept100
Unproven10
Not Defined435

Accesso al vettore

Not Defined0
Physical0
Local38
Adjacent53
Network485

Autenticazione

Not Defined0
High47
Low128
None401

Interazione dell'utente

Not Defined0
Required89
None487

C3BM Index

L'anno scorso

CVSSv3 Base

≤10
≤20
≤30
≤421
≤572
≤6119
≤7109
≤8149
≤949
≤1057

CVSSv3 Temp

≤10
≤20
≤30
≤425
≤598
≤6124
≤7116
≤8121
≤951
≤1041

VulDB

≤10
≤20
≤323
≤432
≤569
≤6134
≤783
≤8148
≤928
≤1059

NVD

≤10
≤20
≤30
≤40
≤57
≤647
≤732
≤873
≤947
≤1052

CNA

≤10
≤20
≤30
≤42
≤53
≤612
≤739
≤830
≤910
≤109

Fornitore

≤10
≤20
≤30
≤40
≤50
≤63
≤72
≤89
≤95
≤106

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Exploiter 0 giorni

<1k53
<2k170
<5k120
<10k76
<25k112
<50k27
<100k14
≥100k4

Exploiter aujourd'hui

<1k459
<2k47
<5k40
<10k12
<25k14
<50k4
<100k0
≥100k0

Sfrutta il volume del mercato

L'anno scorso

🔴 CTI Attività

Affected Versions (497): 0.0.1, 0.7, 0.8, 0.8.1, 0.8.2, 0.8.3, 0.8.4, 0.8.5, 0.8.6, 0.8.7, 0.8.8, 0.8.9, 1, 1.0, 1.0.0.20h.HOL, 1.0.0.r1170-1, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.0.9, 1.0.11, 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.0.16, 1.0.17, 1.0.18, 1.0.36, 1.00.06, 1.00.23, 1.003, 1.01.03, 1.04 08, 1.06, 1.1, 1.1(3), 1.1(5), 1.1.0.09, 1.1.1, 1.1.1.06, 1.1.1.19, 1.1.2, 1.1.3, 1.1.3.4, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.9.4, 1.2, 1.2.1, 1.2.1.14, 1.2.2, 1.2.2.3, 1.2.2.4, 1.2.3, 1.2.4, 1.3, 1.3.0 Build 20230322 Rel.70591, 1.3.1.1, 1.3.1.12, 1.3.12.6-tm, 1.3.13.02-tm, 1.4, 1.4.2.15, 1.4.2.17, 1.4.2.19, 1.4.2.22, 1.5, 1.5-bl024.9.6401, 1.5.1, 1.5.1.05, 1.5.2, 1.6, 1.6.0.1, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41, 1.42, 1.43, 1.44, 1.45, 1.46, 1.47, 1.48, 1.49, 1.50, 1.51, 1.52, 1.53, 1.54, 1.55, 1.56, 1.57, 1.58, 1.59, 1.60, 1.61, 1.62, 1.63, 1.64, 1.65, 1.66, 1.67, 1.68, 1.69, 1.70, 1.71, 1.72, 1.73, 1.74, 1.75, 1.76, 1.77, 1.78, 1.79, 1.80, 1.81, 1.82, 2.0, 2.0.0.19-tm, 2.0.61.58897, 2.0.441_api-2.0.418, 2.00.0111, 2.05.C29GV, 2.06, 2.1.11, 2.2, 2.2.1, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.5, 2.9.6, 2.21.05.08m_a2pb018c1.d16d, 2.22.15, 2.41, 2.70, 2.77p1-1124, 3, 3.0, 3.0.0.1, 3.0.0.1-tm, 3.0.0.2, 3.0.0.3, 3.0.0.4, 3.0.0.4.27, 3.0.0.4.245, 3.0.0.4.374_168, 3.0.0.8, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.4.27, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.02.rc6, 3.03p2-1146, 3.04n, 3.1.3683, 3.2, 3.3.0 Build 31, 3.3.8, 3.7, 3.7.1, 3.16, 3.16.1, 3.16.2, 3.16.3, 3.16.4, 3.16.6 Buil 130529 Rel. 47286n, 3.16.6 Build 130529 Rel.47286n, 4, 4.0, 4.0.0.7, 4.0.2.08-tm, 4.0.3.03-tm, 4.0.4.02-tm, 4.1, 4.1.1, 4.1.1.01, 4.1.1.1, 4.1.1.2, 4.1.1.3, 4.1.1.4, 4.1.1.5, 4.1.1.6, 4.1.1.7, 4.1.1.8, 4.1.1.9, 4.1.1.11, 4.1.1.12, 4.1.1.13, 4.1.1.14, 4.1.1.15, 4.1.1.16, 4.1.1.17, 4.1.1.18, 4.1.1.19, 4.1.1.21, 4.1.1.22, 4.1.1.23, 4.1.1.24, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 4.1.6, 4.2, 4.2.2.08, 4.2.3.03, 4.2.3.06, 4.2.3.07, 4.2.3.09, 4.2.3.1, 4.2.3.14, 4.3.5, 4.4.1, 4.5, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5, 4.5.6, 4.5.7, 4.5.8, 4.5.9, 4.5.11, 4.6, 4.6.8.5, 4.31, 5, 5.0, 5.0.1, 5.05, 5.1, 5.2.2, 5.3, 5.3.8, 5.29.51, 6, 6.0, 6.0.1, 6.0.2, 6.2, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.6.a, 6.2.6.b, 6.2.7, 6.2.8, 6.2.9, 6.2.11, 6.2.12, 6.2.13, 6.2.14, 6.2.15, 6.2.16, 6.2.17, 6.2.18, 6.2.19, 6.2.21, 6.2.22, 6.2.23, 6.2.24, 6.2.25, 6.2.26, 6.2.27, 6.2.28, 6.12.02, 6.25, 6.44, 6.44.1, 6.44.2, 6.44.3, 6_05.139, 7.0, 7.1, 7.2, 7.3, 7.4, 7.30, 8, 8.0, 8.1, 8.2, 8.2.1, 8.2.2, 8.3, 8.4, 8.4.0.1, 8.4.0.2, 8.4.0.3, 8.4.0.4, 8.4.0.5, 8.5, 8.5.0.1, 8.5.0.2, 8.5.1, 8.6, 9, 9.0, 9.1, 9.17, 12.02-01121, 15.3(3)M, 16.10.3(3794), 18, 22.10, 29, 39.3, 40.4, 40.19.36, 54G, 150, 236, 250, 300, 312, 500, 600, 650HW-31, 650R-11, 700, 802.11g, 1000, 1096.11.405.03.111sp02, 1110, 1500, 1723, 2018-10-22, 2022-03-16, 2023.0, 2023.1, 2023.2, 2023.3, 2023.4, 2023.5, 2023.6, 2023.7, 2023.8, 2023.9, 2023.10, 2023.11, 2023.12, 2023.13, 2023.14, 2023.15, 2023.16, 2023.17, 2023.18, 2023.19, 2023.20, 2023.21, 2023.22, 2023.23, 2023.24, 2023.25, 2023.26, 2023.27, 2023.28, 2023.29, 2023.30, 2023.31, 2023.32, 2023.33, 2023.34, 2023.35, 2023.36, 2023.37, 2023.38, 2023.39, 2023.40, 2023.41, 2023.42, 2023.43, 2023.44, 2023.45, 2023.46, 2023.47, 2023.48, 2023.49, 2023.50, 2023.51, 2023.52, 2624, 4400, 20112017, 20190211, 20240112, 2013070830, 2013080900, AAP-3100AR, AC9V1.0, AR-6004, BR-6428NS_v4, BR_SV_g000_R3505VWN1001_s32_7, Cz8.2, Cz8.3, Cz8.4, DG, DGN, DI, DIR, DM, DPC2420, E1000, E1500, E1550, E2100L, E2500, E4200, EA2700, EA3500, EA4500, ECZ730, ES_WLD71-T1_v2.0.20182, Ee400-r, Ee410-r, F5D7130, F7d1301v1, F9k1104v1, FVS318, FW_iB-LR7011A_1.0.2, Firmware V200R002C01SPC200, GPN2.4P21-C-CN, HH70_E1_02.00_22, JNR, M3, P.DG-A4001N, P.DGA4001N, R0318, SCZ730, SCZ740, SMC7004VWBR, SN5400, S_WLD71-T1_v2.0.20182, TM, Ts03-072, Tx6-0q-005 Retail, V200R001, V200R002, V200R002C01SPC200, V200R003, W2001EN-00, WAG, WPNT, WRN 240, WRT Router

Tipo di software: Router Operating System

Data di pubblicazioneBaseTempVulnerabilità0dayOggiSfrConCTICVE
22/04/20243.53.4Tormach xsTECH CNC Router Commands denial of service$0-$5k$0-$5kNot DefinedNot Defined0.13CVE-2024-22815
22/04/20243.53.4Tormach xsTECH CNC Router denial of service$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2024-22807
22/04/20244.64.5Tormach xsTECH CNC Router Hostmot2 Configuration Cookie denial of service$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2024-22811
22/04/20244.64.5Tormach xsTECH CNC Router Name denial of service$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2024-22808
22/04/20243.53.4Tormach xsTECH CNC Router Shared Folder rivelazione di un 'informazione$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2024-22809
22/04/20244.64.5Tormach xsTECH CNC Router IP Address denial of service$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2024-22813
12/04/20248.17.9Juniper cRPD/Juniper Cloud Native Router SSH crittografia debole$5k-$25k$0-$5kNot DefinedOfficial Fix0.05CVE-2024-30407
12/04/20246.35.7Xiamen Four-Faith RMP Router Management Platform sql injection$0-$5k$0-$5kProof-of-ConceptNot Defined0.13CVE-2024-3688
05/04/20243.53.4SpaceX Starlink Wi-Fi Router Gen 2 Setup Page cross site scripting$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2023-49965
05/04/20244.34.1SpaceX Starlink Wi-Fi Router Gen 2/Starlink Dish cross site request forgery$0-$5k$0-$5kNot DefinedOfficial Fix0.05CVE-2023-52235
03/04/20245.25.1Cisco Small Business RV Series Router Web-based Management Interface cross site scripting$5k-$25k$0-$5kNot DefinedOfficial Fix0.00CVE-2024-20362
13/03/20245.45.4Movistar Router 4G cross site request forgery$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2024-2416
13/03/20247.87.8Movistar Router 4G POST Request gui.cgi escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.06CVE-2024-2415
13/03/20248.88.8Movistar Router 4G Remote Code Execution$0-$5k$0-$5kNot DefinedNot Defined0.03CVE-2024-2414
06/03/20245.55.4Apollo Router HTTP Payload Limit denial of service$0-$5k$0-$5kNot DefinedOfficial Fix0.02CVE-2024-28101
12/02/20243.53.4Motorola CX2L Router SystemWizardStatus device_web_ip rivelazione di un 'informazione$0-$5k$0-$5kNot DefinedNot Defined0.00CVE-2024-25360
06/02/20247.27.1TP-Link ER7206 Omada Gigabit VPN Router Web Filtering escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-47618
06/02/20247.27.1TP-Link ER7206 Omada Gigabit VPN Router Web Group Member escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-47617
06/02/20247.27.1TP-Link ER7206 Omada Gigabit VPN Router IPsec Policy escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-47209
06/02/20247.27.1TP-Link ER7206 Omada Gigabit VPN Router GRE Policy escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-47167
06/02/20247.27.1TP-Link ER7206 Omada Gigabit VPN Router Wireguard VPN escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-46683
06/02/20247.27.1TP-Link ER7206 Omada Gigabit VPN Router PPTP Global Configuration escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.02CVE-2023-42664
06/02/20247.27.1TP-LINK ER7206 Omada Gigabit VPN Router PPTP Client escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.04CVE-2023-36498
06/02/20247.27.1TP-LINK ER7206 Omada Gigabit VPN Router Guest Resource escalazione di privilegi$0-$5k$0-$5kNot DefinedNot Defined0.05CVE-2023-43482
19/01/20245.35.0D-Link Good Line Router v2 HTTP GET Request devinfo rivelazione di un 'informazione$5k-$25k$0-$5kProof-of-ConceptNot Defined0.39CVE-2024-0717

551 non vengono visualizzate più voci

Want to stay up to date on a daily basis?

Enable the mail alert feature now!