Zyxel NBG-418N Firmware 1.00(AARP.10)C0

CPE Details

Zyxel NBG-418N Firmware 1.00(AARP.10)C0
1.00\(aarp.10\)c0
2023-02-13
19h01 +00:00
2023-02-16
20h01 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:zyxel:nbg-418n_firmware:1.00\(aarp.10\)c0:*:*:*:*:*:*:*

Informations

Vendor

zyxel

Product

nbg-418n_firmware

Version

1.00\(aarp.10\)c0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-22921 2023-05-01 00h00 +00:00 A cross-site scripting (XSS) vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to store malicious scripts using a web management interface parameter, resulting in denial-of-service (DoS) conditions on an affected device.
7.5
Haute
CVE-2023-22922 2023-05-01 00h00 +00:00 A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote unauthenticated attacker to cause DoS conditions by sending crafted packets if Telnet is enabled on a vulnerable device.
7.5
Haute
CVE-2023-22923 2023-05-01 00h00 +00:00 A format string vulnerability in a binary of the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker to cause denial-of-service (DoS) conditions on an affected device.
6.5
Moyen
CVE-2023-22924 2023-05-01 00h00 +00:00 A buffer overflow vulnerability in the Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.14)C0 could allow a remote authenticated attacker with administrator privileges to cause denial-of-service (DoS) conditions by executing crafted CLI commands on a vulnerable device.
4.9
Moyen
CVE-2022-45441 2023-02-07 00h00 +00:00 A cross-site scripting (XSS) vulnerability in Zyxel NBG-418N v2 firmware versions prior to V1.00(AARP.13)C0, which could allow an attacker to store malicious scripts in the Logs page of the GUI on a vulnerable device. A successful XSS attack could force an authenticated user to execute the stored malicious scripts and then result in a denial-of-service (DoS) condition when the user visits the Logs page of the GUI on the device.
6.1
Moyen