Sierra Wireless RV50 Gateway

CPE Details

Sierra Wireless RV50 Gateway
-
2019-04-09
17h23 +00:00
2019-04-09
17h23 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:sierrawireless:rv50:-:*:*:*:*:*:*:*

Informations

Vendor

sierrawireless

Product

rv50

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-46649 2023-02-10 00h00 +00:00 Acemanager in ALEOS before version 4.16 allows a user with valid credentials to manipulate the IP logging operation to execute arbitrary shell commands on the device.
8.8
High
CVE-2022-46650 2023-02-10 00h00 +00:00 Acemanager in ALEOS before version 4.16 allows a user with valid credentials to reconfigure the device to expose the ACEManager credentials on the pre-login status page.
4.9
Medium
CVE-2019-11851 2022-12-26 00h00 +00:00 The ACENet service in Sierra Wireless ALEOS before 4.4.9, 4.5.x through 4.9.x before 4.9.5, and 4.10.x through 4.13.x before 4.14.0 allows remote attackers to execute arbitrary code via a buffer overflow.
9.8
Critical
CVE-2017-15043 2018-05-04 18h00 +00:00 A vulnerability in Sierra Wireless AirLink GX400, GX440, ES440, and LS300 routers with firmware before 4.4.5 and GX450, ES450, RV50, RV50X, MP70, and MP70E routers with firmware before 4.9 could allow an authenticated remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges. This vulnerability is due to insufficient input validation on user-controlled input in an HTTP request to the targeted device. An attacker in possession of router login credentials could exploit this vulnerability by sending a crafted HTTP request to an affected system.
8.8
High
CVE-2018-10251 2018-05-04 18h00 +00:00 A vulnerability in Sierra Wireless AirLink GX400, GX440, ES440, and LS300 routers with firmware before 4.4.7 and GX450, ES450, RV50, RV50X, MP70, and MP70E routers with firmware before 4.9.3 could allow an unauthenticated remote attacker to execute arbitrary code and gain full control of an affected system, including issuing commands with root privileges.
9.8
Critical