Security
Headlines
HeadlinesLatestCVEs

Tag

#wifi

CVE-2022-44931: IOT_Vul/readme.md at main · z1r00/IOT_Vul

Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet.

CVE
#vulnerability#mac#intel#firefox#wifi
Update now! NetGear routers’ default configuration allows remote attacks

Categories: Exploits and vulnerabilities Categories: News Tags: NetGear Tags: Nighthawk Tags: remote Tags: ports Tags: IPv6 NetGear has issued a hotfix that has to be installed manually, after researchers found a vulnerability that could allow remote attacks. (Read more...) The post Update now! NetGear routers’ default configuration allows remote attacks appeared first on Malwarebytes Labs.

Hacker Fails for the Win

Security researchers share their biggest initial screwups in some of their key vulnerability discoveries.

CVE-2022-41783: Download for RE300 | TP-Link

tdpServer of TP-Link RE300 V1 improperly processes its input, which may allow an attacker to cause a denial-of-service (DoS) condition of the product's OneMesh function.

NETGEAR Router Vulnerability Allowed Access to Restricted Services

By Deeba Ahmed According to Tenable research, NETGEAR had to release last-minute patches for their devices that were a part of the Pwn2Own event. This is a post from HackRead.com Read the original post: NETGEAR Router Vulnerability Allowed Access to Restricted Services

CVE-2022-40918: Exploiting the LW9621 Drone Camera Module - meekworth - Medium

Buffer overflow in firmware lewei_cam binary version 2.0.10 in Force 1 Discovery Wifi U818A HD+ FPV Drone allows attacker to gain remote code execution as root user via a specially crafted UDP packet. Please update the Reference section to these links > http://thiscomputer.com/ > https://www.bostoncyber.org/ > https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368

CVE-2022-32594: December 2022

In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446207; Issue ID: ALPS07446207.

CVE-2022-45655: CVE-vulns/form_fast_setting_wifi_set_timeZone.md at main · Double-q1015/CVE-vulns

Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the timeZone parameter in the form_fast_setting_wifi_set function.

CVE-2022-45643: CVE-vulns/addWifiMacFilter_deviceId.md at main · Double-q1015/CVE-vulns

Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the addWifiMacFilter function.

CVE-2022-45645: CVE-vulns/addWifiMacFilter_derviceMac.md at main · Double-q1015/CVE-vulns

Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceMac parameter in the addWifiMacFilter function.