Количество 3
Количество 3
CVE-2020-3330
A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device.
GHSA-6925-92m9-84w6
A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device.
BDU:2020-03399
Уязвимость службы Telnet микропрограммного обеспечения маршрутизаторов Cisco Small Business RV110W Wireless-N VPN Firewall, позволяющая нарушителю получить полный контроль над устройством
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-3330 A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device. | CVSS3: 9.8 | 5% Низкий | больше 5 лет назад | |
GHSA-6925-92m9-84w6 A vulnerability in the Telnet service of Cisco Small Business RV110W Wireless-N VPN Firewall Routers could allow an unauthenticated, remote attacker to take full control of the device with a high-privileged account. The vulnerability exists because a system account has a default and static password. An attacker could exploit this vulnerability by using this default account to connect to the affected system. A successful exploit could allow the attacker to gain full control of an affected device. | 5% Низкий | больше 3 лет назад | ||
BDU:2020-03399 Уязвимость службы Telnet микропрограммного обеспечения маршрутизаторов Cisco Small Business RV110W Wireless-N VPN Firewall, позволяющая нарушителю получить полный контроль над устройством | CVSS3: 9.8 | 5% Низкий | больше 5 лет назад |
Уязвимостей на страницу