Latest Security News about router

Contact US For API Security>

Multiple SQL injection vulnerabilities in D-Link DSR-Routers

Overview : Multiple SQL injection vulnerabilities in D-Link DSR Routers Affected Product(s) : D-Link DSR-150 (Firmware < v1.08B44) D-Link DSR-150N (Firmware < v1.05B64) D-Link DSR-250 and DSR-250N (Firmware < v1.08B44) D-Link DSR-500 and DSR-500N (Firmware < v1.08B77) D-Link DSR-1000 and DSR-1000N (Firmware < v1.08B77)   Vulnerability Details : CVE ID : CVE-2013-5945 Authentication Bypass by […]

Contact US For API Security>

Incorrect Control over DrayTek Vigor Router

Overview : On DrayTek Vigor2925 devices with firmware 3.8.4.3, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product. On DrayTek Vigor2925 devices with firmware 3.8.4.3, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product. Affected Product(s) […]

Contact US For API Security>

Cisco Linksys E4200 firmware suffers from cross site scripting and local file inclusion vulnerabilities

Overview : Cisco Linksys E4200 1.0.05 Build 7 routers contain a Local File Include Vulnerability which could allow remote attackers to obtain sensitive information or execute arbitrary code by sending a crafted URL request to the apply.cgi script using the submit_type parameter. Affected Product(s) : Cisco Linksys E4200 1.0.05 Build 7 routers Vulnerability Details : […]

Contact US For API Security>

D-Link DSR-250N Persistent Root Access

Overview : D-Link DSR-250N devices with firmware 1.05B73_WW allow Persistent Root Access because of the admin password for the admin account. Affected Product(s) : D-Link DSR-250N Vulnerability Details : CVE ID : CVE-2012-6613 Persistently become real root on your D-Link DSR-250N . If you wanted to do real firewalling on this box, but the router […]