ZyXEL WAC6503D-S AP

Platform Information http://www.zyxelguard.com/WAC6503D-S.asp
Search Engine Search on Google
End of Sales Yes more info
End of Support Yes more info
Wired Connection Yes
Wireless Connection Yes
Fingerprinting Source MAC OUI NIC VENDOR SNMP Dssc HOSTNAME HTTPS
Added at Aug 13, 2019
Manufacturer Name Zyxel Communications Corp
Homepage https://www.zyxel.com/index.shtml
Headquarters Taiwan
Business Status Ongoing

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
No records found.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2018-14892
11/27/2018
HIGH
MEDIUM
Missing protections against Cross-Site Request Forgery in the web application in ZyXEL NSA325 V2 version 4.81 allow attackers to perform state-changing actions via crafted HTTP forms.
CVE-2018-19326
11/17/2018
HIGH
MEDIUM
Zyxel VMG1312-B10D devices before 5.13(AAXA.8)C0 allow ../ Directory Traversal, as demonstrated by reading /etc/passwd.
CVE-2017-17550
11/10/2018
HIGH
MEDIUM
ZyXEL ZyWALL USG 2.12 AQQ.2 and 3.30 AQQ.7 devices are affected by a CSRF vulnerability via a cgi-bin/zysh-cgi cmd action to add a user account. This account's access could, for example, subsequently be used for stored XSS.
CVE-2018-18754
10/29/2018
CRITICAL
MEDIUM
ZyXEL VMG3312-B10B 1.00(AAPP.7) devices have a backdoor root account with the tTn3+Z@!Sr0O+ password hash in the etc/default.cfg file.
CVE-2018-15602
08/26/2018
MEDIUM
MEDIUM
Zyxel VMG3312 B10B devices are affected by a persistent XSS vulnerability via the pages/connectionStatus/connectionStatus-hostEntry.cmd hostname parameter.