Latest CVE Feed
-
6.1
MEDIUMCVE-2021-27180
An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.... Read more
Affected Products : mdaemon- EPSS Score: %0.33
- Published: Apr. 14, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27179
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string.... Read more
- EPSS Score: %0.04
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27178
An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram.... Read more
- EPSS Score: %0.04
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27177
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server.... Read more
- EPSS Score: %0.07
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27176
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions.... Read more
- EPSS Score: %0.07
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27175
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions.... Read more
- EPSS Score: %0.04
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27174
An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions.... Read more
- EPSS Score: %0.07
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
7.5
HIGHCVE-2021-27173
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the t... Read more
- EPSS Score: %0.08
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27172
An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.... Read more
- EPSS Score: %0.22
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
10.0
HIGHCVE-2021-27171
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell).... Read more
- EPSS Score: %0.10
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27170
An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet.... Read more
- EPSS Score: %0.07
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27169
An issue was discovered on FiberHome AN5506-04-FA devices with firmware RP2631. There is a gepon password for the gepon account.... Read more
- EPSS Score: %0.22
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27168
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account.... Read more
- EPSS Score: %0.22
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27167
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so.... Read more
- EPSS Score: %0.22
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27166
An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon.... Read more
- EPSS Score: %0.22
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27165
An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials.... Read more
- EPSS Score: %0.22
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27164
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP.... Read more
- EPSS Score: %0.70
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27163
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP.... Read more
- EPSS Score: %0.70
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27162
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / tattoo@home credentials for an ISP.... Read more
- EPSS Score: %0.28
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024
-
9.8
CRITICALCVE-2021-27161
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP.... Read more
- EPSS Score: %0.70
- Published: Feb. 10, 2021
- Modified: Nov. 21, 2024