Security
Headlines
HeadlinesLatestCVEs

Tag

#telnet

CVE-2022-48616: Huawei NetEngine AR617VW Authenticated Root RaCE

A Huawei data communication product has a command injection vulnerability. Successful exploitation of this vulnerability may allow attackers to gain higher privileges.

CVE
#vulnerability#web#linux#rce#perl#huawei#auth#telnet
CVE-2023-47254

An OS Command Injection in the CLI interface on DrayTek Vigor167 version 5.2.2, allows remote attackers to execute arbitrary system commands and escalate privileges via any account created within the web interface.

CVE-2023-49406: TENDA/w30e/tenda_w30e_telnet/w30e_telnet.md at main · GD008/TENDA

Tenda W30E V16.01.0.12(4843) was discovered to contain a Command Execution vulnerability via the function /goform/telnet.

CVE-2023-48887: GitHub - fengjiachun/Jupiter: Jupiter是一款性能非常不错的, 轻量级的分布式服务框架

A deserialization vulnerability in Jupiter v1.3.1 allows attackers to execute arbitrary commands via sending a crafted RPC request.

CVE-2023-48185: TerraMaster_S1.0_V2.295存在任意文件下载漏洞 - 国民专业级NAS --铁威马官方论坛

Directory Traversal vulnerability in TerraMaster v.s1.0 through v.2.295 allows a remote attacker to obtain sensitive information via a crafted GET request.

CVE-2023-41570: CVE-2023-41570: Access Control vulnerability in MikroTik REST API

MikroTik RouterOS v7.1 to 7.11 was discovered to contain incorrect access control mechanisms in place for the Rest API.

The Mirai Confessions: Three Young Hackers Who Built a Web-Killing Monster Finally Tell Their Story

Netflix, Spotify, Twitter, PayPal, Slack. All down for millions of people. How a group of teen friends plunged into an underworld of cybercrime and broke the internet—then went to work for the FBI.

Not CVE Announcement

The !CVE Project is an initiative to track and identify security issues that are not acknowledged by vendors but still are important for the security community.

CVE-2023-43119

An Access Control issue discovered in Extreme Networks Switch Engine (EXOS) before 32.5.1.5, also fixed in 22.7, 31.7.2 allows attackers to gain escalated privileges using crafted telnet commands via Redis server.