Samsung WEA412i Access Point

Platform Information https://www.samsung.com/sec/business/network/wireless-lan/WEA412i/#specs
Search Engine Search on Google
End of Sales -
End of Support -
Wired Connection -
Wireless Connection Yes
Fingerprinting Source HTTPS NIC VENDOR
Added at May 14, 2019
Manufacturer Name SAMSUNG ELECTRONICS CO., LTD.
Homepage http://www.samsung.com
Headquarters Korea (Republic of)
Business Status Ongoing

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
No records found.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2019-7421
03/21/2019
MEDIUM
MEDIUM
XSS exists in SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 in "/sws.login/gnb/loginView.sws" in multiple parameters: contextpath and basedURL.
CVE-2019-7420
03/21/2019
MEDIUM
MEDIUM
XSS exists in SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 in "/sws.application/information/networkinformationView.sws" in the tabName parameter.
CVE-2019-7419
03/21/2019
MEDIUM
MEDIUM
XSS exists in SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 in "/sws/leftmenu.sws" in multiple parameters: ruiFw_id, ruiFw_pid, ruiFw_title.
CVE-2019-7418
03/21/2019
MEDIUM
MEDIUM
XSS exists in SAMSUNG X7400GX SyncThru Web Service V6.A6.25 V11.01.05.25_08-21-2015 in "/sws/swsAlert.sws" in multiple parameters: flag, frame, func, and Nfunc.
CVE-2018-14745
03/21/2019
HIGH
MEDIUM
Buffer overflow in prot_get_ring_space in the bcmdhd4358 Wi-Fi driver on the Samsung Galaxy S6 SM-G920F G920FXXU5EQH7 allows an attacker (who has obtained code execution on the Wi-Fi chip) to overwrite kernel memory due to improper validation of the ring buffer read pointer. The Samsung ID is SVE-2018-12029.