ZyXEL ES-2024PWR Switch
Platform Information | https://www.cnet.com/products/zyxel-dimension-es-2024pwr-switch-24-ports-managed-desktop-series/ |
---|---|
Search Engine | Search on Google |
End of Sales | - |
End of Support | - |
Wired Connection | Yes |
Wireless Connection | - |
Fingerprinting Source | HTTP NIC VENDOR |
Added at | Nov 05, 2019 |
Manufacturer Name | Zyxel Communications Corp |
Homepage | https://www.zyxel.com/index.shtml |
Headquarters | Taiwan |
Business Status | Ongoing |
Platform’s Common Vulnerabilities and Exposures (CVE) | ||
---|---|---|
CVE-ID
Severity v3.0
Severity v2.0
Description
|
||
No records found.
|
Manufacturer’s Common Vulnerabilities and Exposures (CVE) | ||
---|---|---|
CVE-ID
Severity v3.0
Severity v2.0
Description
|
||
CVE-2017-6884
04/06/2017 HIGH
HIGH
A command injection vulnerability was discovered on the Zyxel EMG2926 home router with firmware V1.00(AAQT.4)b8. The vulnerability is located in the diagnostic tools, specifically the nslookup function. A malicious user may exploit numerous vectors to execute arbitrary commands on the router, such as the ping_ip parameter to the expert/maintenance/diagnostic/nslookup URI.
|
||
CVE-2016-10227
02/21/2017 HIGH
HIGH
Zyxel USG50 Security Appliance and NWA3560-N Access Point allow remote attackers to cause a denial of service (CPU consumption) via a flood of ICMPv4 Port Unreachable packets.
|
||
CVE-2015-7284
12/31/2015 HIGH
MEDIUM
Cross-site request forgery (CSRF) vulnerability on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 allows remote attackers to hijack the authentication of arbitrary users.
|
||
CVE-2015-7283
12/31/2015 HIGH
HIGH
The web administration interface on ZyXEL NBG-418N devices with firmware 1.00(AADZ.3)C0 has a default password of 1234 for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
|
||
CVE-2015-6020
12/31/2015 HIGH
HIGH
ZyXEL PMG5318-B20A devices with firmware 1.00AANC0b5 allow remote authenticated users to obtain administrative privileges by leveraging access to the user account.
|