D-Link DIR-2640-US 1.01B04 PPPoE hard-coded password
A vulnerability, which was classified as critical, was found in D-Link DIR-2640-US 1.01B04 (Router Operating System). Affected is some unknown
A vulnerability, which was classified as critical, was found in D-Link DIR-2640-US 1.01B04 (Router Operating System). Affected is some unknown
A vulnerability has been found in D-Link DIR-2640-US 1.01B04 (Router Operating System) and classified as problematic. Affected by this vulnerability
A vulnerability classified as problematic was found in D-Link AC2600 1.01B04 (Router Operating System). Affected by this vulnerability is an
A vulnerability was found in D-Link DIR-2640-US up to 1.01B04 (Router Operating System). It has been rated as critical. This
A vulnerability classified as problematic was found in TP-Link TL-WPA4220 4.0.2 Build 20180308 Rel.37064 (Router Operating System). This vulnerability affects
A vulnerability was found in TP-Link TL-WPA4220 4.0.2 Build 20180308 Rel.37064 (Router Operating System) and classified as problematic. Affected by
A vulnerability, which was classified as problematic, has been found in Samsung SmartThings (Router Operating System). Affected by this issue
A vulnerability has been found in TP-Link TL-SG2005 and TL-SG2008 1.0.0 Build 20180529 Rel.40524 (Router Operating System) and classified as
A vulnerability was found in TP-Link TL-SG2005 and TL-SG2008 1.0.0 Build 20180529 Rel.40524 (Router Operating System). It has been classified
Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:https://www.cisco.com/c/en/us/products/end-user-license-agreement.html
Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.
When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html
Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.
Fixed Releases
Cisco fixed this vulnerability in Cisco Enterprise NFVIS releases 4.5.1 and later.
Customers can download Cisco Enterprise NFVIS from the Software Center on Cisco.com by doing the following:
Click Browse all.
Choose Routers > Network Functions Virtualization > Enterprise NFV Infrastructure Software > NFV Infrastructure Software.
Access releases by using the left pane of the Enterprise NFV Infrastructure Software page.
Virtual Patching gives a rapid way of a solution to provide web security. Even though the preferred solution is temporary,
Overview : Tenda N300 allows Authentication Bypass vuln through Malformed HTTP Request Affected Product(s) : N300/N301 Router Vulnerability Details :
Why would your Business need VAPT? It is very necessary to conduct a network security audit periodically to ensure the
Overview : Certain NETGEAR devices are affected by stored XSS. This affects D7800 before 1.0.1.56, R7500v2 before 1.0.3.46, R7800 before
Overview : Cisco Linksys E4200 1.0.05 Build 7 routers contain a Local File Include Vulnerability which could allow remote attackers
Overview : D-Link DSR-250N devices with firmware 1.05B73_WW allow Persistent Root Access because of the admin password for the admin
How can you secure your Exposed services without installing the patch by the vendor? Have a look at the use
Overview : D-Link DIR-859 routers before v1.07b03_beta allow Unauthenticated Information Disclosure via the AUTHORIZED_GROUP=1%0a value, as demonstrated by vpnconfig.php. Affected
International Insurance firms in the Middle East faced an issue with their Corporate Network Our products and services help them
Overview : All HTML forms present in the Belkin F5D8236-4 v2 are susceptible to Cross-Site Request Forgery. Affected Product(s) :
Overview : Cisco Aironet Access Points Unauthorized Access Vulnerability CWE-284 / CVE-2019-15260 A vulnerability in Cisco Aironet Access Points (APs) Software could
Overview : NETGEAR JNR1010 devices flaws Affected Product(s) : Netgear Router JNR1010 Version 1.0.0.24 Vulnerability Details : CVE ID :
Overview : Moxa EDR 810 Series Improper Input Validation and Improper Access Control vulnerabilities Affected Product(s) : EDR-810: All versions
Overview : Cisco IOS XE Software NAT Session Initiation Protocol Application Layer Gateway Denial of Service Vulnerability CWE-399/ CVE-2019-12646 A