RSS   Vulnerabilities for 'Mv 410r'   RSS

2009-07-05
 
CVE-2009-2323

CWE-352
 

 
The web interface on the Axesstel MV 410R redirects users back to the referring page after execution of some CGI scripts, which makes it easier for remote attackers to avoid detection of cross-site request forgery (CSRF) attacks, as demonstrated by a redirect from the cgi-bin/wireless.cgi script.

 
 
CVE-2009-2322

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in cgi-bin/sysconf.cgi on the Axesstel MV 410R allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

 
 
CVE-2009-2321

CWE-Other
 

 
cgi-bin/sysconf.cgi on the Axesstel MV 410R allows remote attackers to cause a denial of service (configuration reset) via a RESTORE=RESTORE query string.

 
 
CVE-2009-2320

CWE-20
 

 
The web interface on the Axesstel MV 410R relies on client-side JavaScript code to validate input, which allows remote attackers to send crafted data, and possibly have unspecified other impact, via a client that does not process JavaScript.

 
 
CVE-2009-2319

CWE-310
 

 
The default configuration of the Wi-Fi component on the Axesstel MV 410R does not use encryption, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.

 
 
CVE-2009-2318

CWE-20
 

 
The Axesstel MV 410R allows remote attackers to cause a denial of service via a flood of SYN packets, a related issue to CVE-1999-0116.

 
 
CVE-2009-2317

CWE-255
 

 
The Axesstel MV 410R has a certain default administrator password, and does not force a password change, which makes it easier for remote attackers to obtain access.

 

 >>> Vendor: Axesstel 3 Products
Akw-d800
Mv 410r
Mu553s firmware


Copyright 2024, cxsecurity.com

 

Back to Top