KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers an insufficient session expiration. This occurs when the web application permits an attacker to reuse old session credentials or session IDs for authorization. Insufficient session expiration increases the device's exposure to attacks that can steal or reuse user's session identifiers.
0c41b0e418db6cc3fce61cd5b95edcec7bd24c9c50d23011b09d080bdd1e22af
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from a privilege escalation vulnerability. The non-privileged default user (user:user123) can elevate his/her privileges by sending a HTTP GET request to the configuration export endpoint and disclose the admin password. Once authenticated as admin, an attacker will be granted access to the additional and privileged pages.
ac657c7a920abc9292d94f15c71e9ea580b9222af282ef5304979b66ed446773
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 is susceptible to an unauthenticated configuration disclosure when direct object reference is made to the export_settings.cgi file using an HTTP GET request. This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and full system access.
603965054eb95da0577b3266629d2f47e3091bf6d4d5db74af928a5dc068442f
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 allows unauthenticated attackers to restart the device with an HTTP GET request to /goform/RestartDevice page.
004ac443ef3437a7dc29dd40e264756e3f0c35852ab627528f60fae29ab56c98
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 allows unauthenticated attackers to visit the unprotected /goform/LoadDefaultSettings endpoint and reset the device to its factory default settings. Once the GET request is made, the device will reboot with its default settings allowing the attacker to bypass authentication and take full control of the system.
3156b5880f18090db2cb6967bfda33c291e74fcbb4644825d31a6a7dfc004ac5
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 has an unprotected web management server that is vulnerable to sensitive information disclosure vulnerability. An unauthenticated attacker can visit the syslog page and disclose the webserver's log file containing system information running on the device.
958deee99bc7702bdefacdd8e76f855a06c557df09b4f20f289c8fa141562a8e
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from an insecure direct object reference vulnerability.
482b29e97ee4ccf4b8dc4e5040476664b4f3b97ca5897f736e1d3996a4ff86dc
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 has several backdoors and hidden pages that allow for remote code execution, overwriting of the bootrom, and enabling debug mode.
9e5c4d9e5a68baf4b8009ac9f6cdf69d972d6968d94358877a76aad28b0c3a26
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 generates its SSID and password based on the WAN MAC address.
4e69427bcce8662fc36c8b7b37b27b7d855a9ed957d32eec33f827ef7036e3a8
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 utilizes hard-coded credentials within its Linux distribution image. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the router.
d71480ffcd0ea393d093598a1fb0293c504c2831049982e7b945a93c48d78c4e
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from an authentication bypass vulnerability. An unauthenticated attacker can disclose sensitive and clear-text information resulting in authentication bypass by downloading the configuration of the device and revealing the admin password.
73a44e688725b9ff0a6abb769d144776d60b2d0df7ed23e37df9c6d6e287e278
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 suffers from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands through the pingAddr HTTP POST parameter bypassing the injection protection filter.
d2bfe72177362172a25975038e95f6f160f7bd9fdd925bd9901330b19327c20e
A vulnerability exists within win32k that can be leveraged by an attacker to escalate privileges to those of NT AUTHORITY\SYSTEM. The flaw exists in how the WndExtra field of a window can be manipulated into being treated as an offset despite being populated by an attacker-controlled value. This can be leveraged to achieve an out of bounds write operation, eventually leading to privilege escalation.
ed073b3c17d4f49ffa13834abab3bf326257f8e012a4c37b26486bc312e9e80d
This Metasploit module exploits an unauthenticated log file upload within the log_upload_wsgi.py file of VMWare View Planner 4.6 prior to 4.6 Security Patch 1. Successful exploitation will result in remote code execution as the apache user inside the appacheServer Docker container.
379b0cbe47bd964e0aa4ad293ae73ca2ada00daefc19072ca7c7c1d184c798cd
SOYAL 701Client version 9.0.1 suffers from an insecure permissions vulnerability.
98c780d8c151eac1f051e4d317f17b2296da9de1759ad6d0d93bec928bcc775c
SOYAL 701Server version 9.0.1 suffers from an insecure permissions vulnerability.
171228adc800c601677edb1f2cba5f4d1ce16c24bc4b7eea04f91c819b71a21d
SOYAL Biometric Access Control System version 5.0 suffers from a cross site request forgery vulnerability.
93e556f6e1d9d2300afc6b657f1c1067ff56c303dec1b576e8ad9bba10eaa74c
The web control panel SOYAL Biometric Access Control System version 5.0 uses a weak set of default administrative credentials (no password) that can be easily guessed in remote password attacks.
cf5ffc7de99376f5a3ece84fc81ec2a036e2f2d26fee7ffd41cc3181fbb1e3c7
The controller in SOYAL Biometric Access Control System version 5.0 suffers from a cleartext transmission of sensitive information. This allows interception of the HTTP traffic and disclose the Master code and the Arming code via a man-in-the-middle attack. An attacker can obtain these codes to enter into the controller's Programming mode and bypass physical security controls in place.
6f0eb9f532a18e1eeef54655c0a63c7701e9269776744ed835a8c1c721f5b664
VestaCP version 0.9.8 suffers from a command injection vulnerability.
938b6d6c27f61c9809c0637869f486e2fe7cb522a5ec286367a8f2f9bb53eebb
Eclipse Mosquitto MQTT broker version 2.0.9 suffers from an unquoted service path vulnerability.
efc7cf6ebc4c5db860556ccce0cc12bb6ea219600a360c7c7bf534ac801d97eb
Profiling System for Human Resource Management version 1.0 suffers from a remote code execution vulnerability.
9c756599edc69f8682b0752bc95b0fb6e0dcbeeca4b9ab9487c21e63a1dbee3f
Ubuntu Security Notice 4882-1 - It was discovered that the Ruby JSON gem incorrectly handled certain JSON files. If a user or automated system were tricked into parsing a specially crafted JSON file, a remote attacker could use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. It was discovered that Ruby incorrectly handled certain socket memory operations. A remote attacker could possibly use this issue to obtain sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. Various other issues were also addressed.
283a88217feec850de336cca9e09f282e9c9a4430901603c938294b461152b82
Boonex Dolphin version 7.4.2 suffers from a persistent cross site scripting vulnerability.
3aba4256e8f453adda70e767a176f3f85d033b5f0e8c81fda1e98d36564435c4
Red Hat Security Advisory 2021-0940-01 - This is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel. Issues addressed include a use-after-free vulnerability.
e4eafc7f5a94df38fbe7e1a726f909953539595501cab7782a4bb7e073355a5a