[webapps] FTP2FTP 1.0 – Arbitrary File Download
[webapps] Modx Revolution < 2.6.4 – Remote Code Execution
[webapps] Smart SMS & Email Manager 3.3 – 'contact_type_id' SQL Injection
[webapps] Smart SMS & Email Manager 3.3 – 'contact_type_id' SQL Injection
Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Default Credentials
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems utilize hard-coded credentials within its Linux distribution image. These sets of credentials are never exposed to the end-user and cannot be changed through any normal operation of the gateway. Another vulnerability could allow an authenticated attacker to gain root access. The vulnerability is due to default […]
Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Remote Root
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems suffer from multiple authenticated arbitrary remote code execution vulnerabilities with highest privileges. This is due to multiple hidden and undocumented features within the admin interface that allows an attacker to create crontab jobs and/or modify the system startup script that allows execution of arbitrary code as […]
VelotiSmart WiFi B-380 Camera Directory Traversal
VelotiSmart WiFi B-380 Camera suffers from a directory traversal vulnerability.
Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Denial Of Service
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems have an undocumented and hidden feature that allows an authenticated attacker to list running processes in the operating system and send arbitrary signals to kill any process running in the background including starting and stopping system services. This impacts availability and can be triggered also by […]
Microhard Systems 3G/4G Cellular Ethernet And Serial Gateway Hidden Features
Microhard Systems 3G/4G Cellular Ethernet and Serial Gateway systems have undocumented and hidden features present via the web management interface. These features allow an authenticated attacker to take full control of the device and/or modify internal OS settings, read arbitrary files or even render the device unusable. Many versions are affected.