VARIoT news about IoT security

Trust: 3.75

Fetched: Jan. 10, 2024, 9:44 a.m., Published: Jan. 24, 2022, 10:31 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: xerox model: phaser
vendor: xerox model: workcentre
db: NVD ids: CVE-2022-23968

Trust: 4.25

Fetched: Jan. 10, 2024, 9:42 a.m., Published: Sept. 18, 2023, 5:34 p.m.
Vulnerabilities: privilege escalation, default credentials, denial of service
Affected productsExternal IDs
vendor: google model: wifi
vendor: google model: home
vendor: palo model: networks
vendor: cisco model: guard
vendor: cisco model: routers
vendor: palo alto networks model: networks
vendor: sonos model: sonos

Trust: 4.5

Fetched: Jan. 10, 2024, 9:41 a.m., Published: Jan. 10, 2023, midnight
Vulnerabilities: command injection, code execution
Affected productsExternal IDs
vendor: essential model: phone

Trust: 3.5

Fetched: Jan. 10, 2024, 9:40 a.m., Published: Jan. 10, 2022, midnight
Vulnerabilities: -

Trust: 3.0

Fetched: Jan. 10, 2024, 9:40 a.m., Published: Jan. 10, 2023, midnight
Vulnerabilities: -
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-202104-1963, VAR-202104-1960

Trust: 5.25

Fetched: Jan. 10, 2024, 9:37 a.m., Published: April 19, 2022, midnight
Vulnerabilities: memory corruption, buffer overflow, integer overflow...
Affected productsExternal IDs
vendor: cesanta model: mongoose os
vendor: cesanta model: mongoose
vendor: riot model: riot
vendor: windriver model: river vxworks
vendor: windriver model: vxworks
vendor: blackberry model: link
vendor: blackberry model: blackberry
db: NVD ids: CVE-2021-27427, CVE-2021-27433, CVE-2021-31572, CVE-2021-27502, CVE-2021-27425, CVE-2021-31571, CVE-2021-27439, CVE-2020-13603, CVE-2021-27431, CVE-2021-27417, CVE-2021-22680, CVE-2021-22156, CVE-2021-3420, CVE-2021-26706, CVE-2021-27411, CVE-2021-27504, CVE-2021-27435, CVE-2020-35198, CVE-2021-22684, CVE-2021-27429, CVE-2020-28895, CVE-2021-22636, CVE-2021-27421, CVE-2021-30636, CVE-2021-27419, CVE-2021-26461

Trust: 4.0

Fetched: Jan. 10, 2024, 9:26 a.m., Published: -
Vulnerabilities: buffer overflow
Affected productsExternal IDs
db: NVD ids: CVE-2023-38545

Trust: 4.75

Fetched: Jan. 10, 2024, 9:20 a.m., Published: Oct. 27, 2023, 6 a.m.
Vulnerabilities: privilege escalation
Affected productsExternal IDs
vendor: snort model: snort
vendor: cisco systems model: cisco ios xe
vendor: cisco systems model: ios software
vendor: cisco systems model: cisco ios
vendor: cisco systems model: ios xe software
vendor: cisco systems model: ip phone
vendor: cisco systems model: unified communications manager express
vendor: cisco systems model: cisco unified border element
vendor: cisco systems model: ios xe
vendor: cisco systems model: catalyst 9800
vendor: cisco systems model: unified communications
vendor: cisco systems model: cisco unified communications manager
vendor: cisco systems model: identity services engine
vendor: cisco systems model: ios xr
vendor: cisco systems model: unified border element
vendor: cisco systems model: wireless lan controller
vendor: cisco systems model: nexus
vendor: cisco systems model: nx-os
vendor: cisco systems model: dna center
vendor: cisco systems model: ios-xe software
vendor: cisco systems model: ip phones
vendor: cisco systems model: aireos
vendor: cisco systems model: catalyst
vendor: cisco systems model: technical support
vendor: cisco systems model: unified communications manager
vendor: cisco systems model: router
vendor: cisco model: cisco ios xe
vendor: cisco model: ios software
vendor: cisco model: cisco ios
vendor: cisco model: ios xe software
vendor: cisco model: ip phone
vendor: cisco model: unified communications manager express
vendor: cisco model: cisco unified border element
vendor: cisco model: ios xe
vendor: cisco model: catalyst 9800
vendor: cisco model: unified communications
vendor: cisco model: cisco unified communications manager
vendor: cisco model: identity services engine
vendor: cisco model: ios xr
vendor: cisco model: unified border element
vendor: cisco model: wireless lan controller
vendor: cisco model: nexus
vendor: cisco model: nx-os
vendor: cisco model: dna center
vendor: cisco model: ios-xe software
vendor: cisco model: ip phones
vendor: cisco model: aireos
vendor: cisco model: catalyst
vendor: cisco model: technical support
vendor: cisco model: unified communications manager
vendor: cisco model: router
db: NVD ids: CVE-2023-20198

Trust: 5.25

Fetched: Jan. 10, 2024, 9:19 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: brute force attack, memory corruption, service crash...
Affected productsExternal IDs
vendor: citrix model: deterministic network enhancer
vendor: citrix model: gateway
vendor: cisco systems model: anyconnect ssl vpn
vendor: cisco systems model: security device manager
vendor: cisco systems model: cisco ios xr
vendor: cisco systems model: asa 5500 series
vendor: cisco systems model: unified meetingplace
vendor: cisco systems model: asa 5500
vendor: cisco systems model: asa software
vendor: cisco systems model: meetingplace
vendor: cisco systems model: firepower 2100
vendor: cisco systems model: anyconnect secure mobility client
vendor: cisco systems model: pix firewall
vendor: cisco systems model: vpn 5000 client
vendor: cisco systems model: cisco secure access control server
vendor: cisco systems model: firepower
vendor: cisco systems model: vpn 3002 hardware client
vendor: cisco systems model: ip communicator
vendor: cisco systems model: anyconnect secure mobility client software
vendor: cisco systems model: unified videoconferencing manager
vendor: cisco systems model: firepower 4110
vendor: cisco systems model: secure desktop
vendor: cisco systems model: vpn 3000 concentrator
vendor: cisco systems model: catalyst 6500
vendor: cisco systems model: secure access control server
vendor: cisco systems model: vpn 3000 series
vendor: cisco systems model: vpn concentrator
vendor: cisco systems model: cisco catalyst 6500 series
vendor: cisco systems model: cisco pix firewall
vendor: cisco systems model: unified videoconferencing
vendor: cisco systems model: adaptive security appliance
vendor: cisco systems model: aironet
vendor: cisco systems model: cisco 7600 series
vendor: cisco systems model: cisco secure desktop
vendor: cisco systems model: wireless control system
vendor: cisco systems model: wireless lan solution engine
vendor: cisco systems model: series switches
vendor: cisco systems model: cisco ios
vendor: cisco systems model: ios xr software
vendor: cisco systems model: routers
vendor: cisco systems model: wireless lan controllers
vendor: cisco systems model: cisco anyconnect secure mobility client
vendor: cisco systems model: series industrial security appliances
vendor: cisco systems model: anyconnect vpn client
vendor: cisco systems model: firepower threat defense
vendor: cisco systems model: catalyst 6500 series
vendor: cisco systems model: device manager
vendor: cisco systems model: network analysis module
vendor: cisco systems model: unified meetingplace express
vendor: cisco systems model: cisco vpn 3000 series
vendor: cisco systems model: vpn client
vendor: cisco systems model: clientless ssl vpn
vendor: cisco systems model: unified video advantage
vendor: cisco systems model: meraki mx
vendor: cisco systems model: 7600 series
vendor: cisco systems model: access control server
vendor: cisco systems model: ciscoworks
vendor: cisco systems model: wan manager
vendor: cisco systems model: cisco adaptive security appliance
vendor: cisco systems model: adaptive security virtual appliance
vendor: cisco systems model: access points
vendor: cisco systems model: firepower 9300
vendor: cisco systems model: ios xr
vendor: cisco systems model: series routers
vendor: cisco systems model: aironet access points
vendor: cisco systems model: series
vendor: cisco systems model: cisco vpn client
vendor: cisco systems model: unified personal communicator
vendor: cisco systems model: ftd virtual
vendor: cisco systems model: catalyst
vendor: cisco model: anyconnect ssl vpn
vendor: cisco model: security device manager
vendor: cisco model: cisco ios xr
vendor: cisco model: asa 5500 series
vendor: cisco model: unified meetingplace
vendor: cisco model: asa 5500
vendor: cisco model: asa software
vendor: cisco model: meetingplace
vendor: cisco model: firepower 2100
vendor: cisco model: anyconnect secure mobility client
vendor: cisco model: pix firewall
vendor: cisco model: vpn 5000 client
vendor: cisco model: cisco secure access control server
vendor: cisco model: firepower
vendor: cisco model: vpn 3002 hardware client
vendor: cisco model: ip communicator
vendor: cisco model: anyconnect secure mobility client software
vendor: cisco model: unified videoconferencing manager
vendor: cisco model: firepower 4110
vendor: cisco model: secure desktop
vendor: cisco model: vpn 3000 concentrator
vendor: cisco model: catalyst 6500
vendor: cisco model: secure access control server
vendor: cisco model: vpn 3000 series
vendor: cisco model: vpn concentrator
vendor: cisco model: cisco catalyst 6500 series
vendor: cisco model: cisco pix firewall
vendor: cisco model: unified videoconferencing
vendor: cisco model: adaptive security appliance
vendor: cisco model: aironet
vendor: cisco model: cisco 7600 series
vendor: cisco model: cisco secure desktop
vendor: cisco model: wireless control system
vendor: cisco model: wireless lan solution engine
vendor: cisco model: series switches
vendor: cisco model: cisco ios
vendor: cisco model: ios xr software
vendor: cisco model: routers
vendor: cisco model: wireless lan controllers
vendor: cisco model: cisco anyconnect secure mobility client
vendor: cisco model: series industrial security appliances
vendor: cisco model: anyconnect vpn client
vendor: cisco model: firepower threat defense
vendor: cisco model: catalyst 6500 series
vendor: cisco model: device manager
vendor: cisco model: network analysis module
vendor: cisco model: unified meetingplace express
vendor: cisco model: cisco vpn 3000 series
vendor: cisco model: vpn client
vendor: cisco model: clientless ssl vpn
vendor: cisco model: unified video advantage
vendor: cisco model: meraki mx
vendor: cisco model: 7600 series
vendor: cisco model: access control server
vendor: cisco model: ciscoworks
vendor: cisco model: wan manager
vendor: cisco model: cisco adaptive security appliance
vendor: cisco model: adaptive security virtual appliance
vendor: cisco model: access points
vendor: cisco model: firepower 9300
vendor: cisco model: ios xr
vendor: cisco model: series routers
vendor: cisco model: aironet access points
vendor: cisco model: series
vendor: cisco model: cisco vpn client
vendor: cisco model: unified personal communicator
vendor: cisco model: ftd virtual
vendor: cisco model: catalyst
vendor: safenet model: highassurance remote
db: NVD ids: CVE-2021-34788, CVE-2011-2054, CVE-2008-0324, CVE-2007-1467, CVE-2002-1108, CVE-2011-2040, CVE-2021-1519, CVE-2002-0852, CVE-2002-1095, CVE-2013-1173, CVE-2012-5429, CVE-2002-1105, CVE-2008-5121, CVE-2003-0260, CVE-2018-0227, CVE-2011-2039, CVE-2002-1107, CVE-2015-7600, CVE-2013-1172, CVE-2023-20241, CVE-2012-3052, CVE-2007-4415, CVE-2022-20715, CVE-2012-2493, CVE-2003-1004, CVE-2018-0229, CVE-2023-20269, CVE-2021-1366, CVE-2006-5806, CVE-2009-5007, CVE-2012-2494, CVE-2022-20933, CVE-2013-3415, CVE-2012-2496, CVE-2009-4118, CVE-2021-1567, CVE-2002-0853, CVE-2023-20178, CVE-2015-6305, CVE-2012-1370, CVE-2008-2733, CVE-2003-0259, CVE-2002-1491, CVE-2003-0258, CVE-2002-1104, CVE-2002-1447, CVE-2015-4211, CVE-2006-2679, CVE-2013-5559, CVE-2011-2041, CVE-2022-20713, CVE-2002-1106, CVE-2019-15261, CVE-2002-1092, CVE-2007-4414, CVE-2011-3309, CVE-2012-3094, CVE-2020-3435, CVE-2013-5509, CVE-2023-20240, CVE-2011-2678, CVE-2022-20758, CVE-2002-1492, CVE-2021-1568

Trust: 6.25

Fetched: Jan. 10, 2024, 9:18 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: untrusted search path, denial of service, application crash...
Affected productsExternal IDs
vendor: samsung smartthings model: smartthings hub
vendor: samsung smartthings model: smartthings hub sth-eth-250
vendor: samsung smartthings model: samsung smartthings hub
vendor: samsung smartthings model: sth-eth-250
vendor: samsung smartthings model: samsung smartthings hub sth-eth-250
vendor: comcast model: comcast xfinity
vendor: comcast model: xfinity home security
vendor: comcast model: xfinity
vendor: comcast model: xfinity home security system
vendor: samsung model: smartthings hub
vendor: samsung model: smartthings hub sth-eth-250
vendor: samsung model: samsung smartthings hub
vendor: samsung model: sth-eth-250
vendor: samsung model: samsung smartthings hub sth-eth-250
vendor: xiaomi model: rtcgq01lm
vendor: xiaomi model: wsdcgq01lm
vendor: xiaomi model: zncz03lm
vendor: xiaomi model: mccgq01lm
vendor: xiaomi model: dgnwg03lm
vendor: wireshark model: wireshark
vendor: osram model: sylvania osram lightify home
vendor: osram model: lightify home
vendor: osram model: lightify pro
vendor: asus model: ts-101
vendor: asus model: ms-101
vendor: asus model: dl-101
vendor: asus model: as-101
vendor: asus model: mw100
vendor: asus model: hg100
vendor: asus model: ws-101
vendor: asus model: asus
vendor: utc fire & security model: ge-mc100-ntp/gps-zb
vendor: utc fire & security model: clock
vendor: utc fire & security model: fire & security ge-mc100-ntp/gps-zb
vendor: xfinity model: gateway
vendor: smartthings model: smartthings hub
db: NVD ids: CVE-2019-15910, CVE-2018-3926, CVE-2024-0210, CVE-2016-2398, CVE-2015-8732, CVE-2020-7476, CVE-2023-24678, CVE-2016-5054, CVE-2022-39064, CVE-2019-15912, CVE-2019-20480, CVE-2010-4301, CVE-2015-6244, CVE-2020-27891, CVE-2019-15914, CVE-2016-5058, CVE-2019-15915, CVE-2012-1288, CVE-2023-29780, CVE-2020-27890, CVE-2016-1562, CVE-2023-29779, CVE-2022-39065, CVE-2019-20481, CVE-2018-19628, CVE-2019-15913, CVE-2020-28952, CVE-2020-27892, CVE-2017-18868, CVE-2019-15911

Trust: 5.75

Fetched: Jan. 10, 2024, 9:12 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: code execution
Affected productsExternal IDs
vendor: bosch model: nexo
db: NVD ids: CVE-2023-48258, CVE-2023-48248, CVE-2023-48254, CVE-2023-48251, CVE-2023-48253, CVE-2023-48252, CVE-2023-48265, CVE-2023-48262, CVE-2023-48244, CVE-2023-48247, CVE-2023-48266, CVE-2023-48246, CVE-2023-48263, CVE-2023-48245, CVE-2023-48260, CVE-2023-48261, CVE-2023-48257, CVE-2023-48249, CVE-2023-48264, CVE-2023-48255, CVE-2023-48243, CVE-2023-48259, CVE-2023-48256, CVE-2023-48250, CVE-2023-48242

Trust: 4.75

Fetched: Jan. 10, 2024, 9:07 a.m., Published: Jan. 9, 2024, 9:52 a.m.
Vulnerabilities: path traversal, cross-site scripting, sql injection...
Affected productsExternal IDs
vendor: netatalk model: netatalk
db: NVD ids: CVE-2022-43634, CVE-2023-47560, CVE-2023-50916, CVE-2023-41287, CVE-2023-47559, CVE-2023-39296, CVE-2023-41288

Trust: 3.75

Fetched: Jan. 9, 2024, 10:23 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: cisco model: cisco ios xe
vendor: cisco model: cisco ios
vendor: cisco model: ios xe
vendor: cisco model: ios xe software
vendor: cisco systems model: cisco ios xe
vendor: cisco systems model: cisco ios
vendor: cisco systems model: ios xe
vendor: cisco systems model: ios xe software
db: NVD ids: CVE-2023-20198, CVE-2023-20273

Trust: 4.0

Fetched: Jan. 9, 2024, 10:19 a.m., Published: Jan. 5, 2024, 3:08 p.m.
Vulnerabilities: sql injection, code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-39336

Trust: 3.5

Fetched: Jan. 9, 2024, 10:19 a.m., Published: Dec. 14, 2023, 7:45 a.m.
Vulnerabilities: code execution, security bypass
Affected productsExternal IDs
vendor: samsung model: galaxy
vendor: samsung model: samsung mobile
vendor: samsung model: knox
vendor: samsung model: mobile phones
vendor: samsung model: mobile

Trust: 3.25

Fetched: Jan. 9, 2024, 10:17 a.m., Published: -
Vulnerabilities: code execution
Affected productsExternal IDs
db: NVD ids: CVE-2023-35629

Trust: 4.25

Fetched: Jan. 9, 2024, 10:16 a.m., Published: Dec. 18, 2023, midnight
Vulnerabilities: information leakage, default credentials
Affected productsExternal IDs
vendor: google model: home

Trust: 4.25

Fetched: Jan. 9, 2024, 10:16 a.m., Published: Jan. 7, 2024, 9:15 a.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
db: NVD ids: CVE-2023-7209

Trust: 3.75

Fetched: Jan. 9, 2024, 10:15 a.m., Published: Jan. 4, 2024, 5:22 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: google chrome
vendor: google model: android
vendor: google model: chrome
db: NVD ids: CVE-2024-0224, CVE-2024-0223, CVE-2024-0225, CVE-2024-0222
Related entries in the VARIoT vulnerabilities database: VAR-202205-1788, VAR-201404-0470, VAR-201911-1316, VAR-201404-0106, VAR-201903-0209, VAR-201810-1203, VAR-201104-0174, VAR-201905-0654, VAR-202211-1501, VAR-201802-0673, VAR-202305-2121, VAR-202112-2003, VAR-201512-0082, VAR-202203-0913, VAR-202304-1913, VAR-201704-1363, VAR-200412-0994, VAR-200708-0021, VAR-201512-0084, VAR-202207-1385, VAR-202304-1906, VAR-202301-0921, VAR-202112-2004, VAR-202203-1898, VAR-201910-1281, VAR-201904-1090, VAR-201911-1314, VAR-201911-1315, VAR-201808-0226, VAR-201904-1092, VAR-201710-1144, VAR-201801-1490, VAR-201905-0028, VAR-202304-2162, VAR-202012-0977, VAR-202308-2818, VAR-200505-0603, VAR-202305-0209, VAR-201906-0481, VAR-201811-0080, VAR-201512-0093, VAR-202107-0888, VAR-202003-0923, VAR-201904-0115, VAR-202207-1298, VAR-200803-0332, VAR-202112-2079, VAR-201905-0657, VAR-201406-0156, VAR-201111-0160, VAR-202304-2073, VAR-201512-0085, VAR-201712-0575, VAR-200909-0001, VAR-201808-0956, VAR-201903-0022, VAR-200708-0020, VAR-201906-0479, VAR-201811-0679, VAR-202112-2078, VAR-201512-0083, VAR-202205-1787, VAR-202003-1707, VAR-200909-0002, VAR-202304-1936, VAR-202212-1097, VAR-200607-0314, VAR-202302-0865, VAR-201905-0653, VAR-200708-0018, VAR-201911-1313, VAR-200605-0268, VAR-202305-2285, VAR-201905-0651, VAR-201709-0027, VAR-201811-0016, VAR-202009-0964, VAR-202103-0233, VAR-201512-0086, VAR-202304-1973, VAR-201904-1091, VAR-201911-1311, VAR-202205-1789, VAR-201512-0094, VAR-202205-1790, VAR-201401-0271, VAR-201911-1312, VAR-201704-1556, VAR-201904-1089, VAR-202008-0765, VAR-201404-0472, VAR-201811-0079, VAR-201707-0041, VAR-201404-0471, VAR-201410-1357, VAR-201404-0469, VAR-201410-1356, VAR-200805-0357, VAR-201804-1287, VAR-201904-1093, VAR-202006-0920, VAR-200708-0019, VAR-202205-0957, VAR-201702-0159

Trust: 6.25

Fetched: Jan. 9, 2024, 10:13 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: session hijacking, privilege escalation, information exposure...
Affected productsExternal IDs
vendor: prestige model: zyxel
vendor: tp-link model: routers
vendor: tp-link model: gateway
vendor: zyxel model: gs1900-8 firmware
vendor: zyxel model: o2 dsl router classic
vendor: zyxel model: vmg8924-b30a
vendor: zyxel model: vmg1312-b10d
vendor: zyxel model: nsa210
vendor: zyxel model: usg40w
vendor: zyxel model: sbg3300-nb00
vendor: zyxel model: sbg3300-n000
vendor: zyxel model: vmg3312-b10b 1.00
vendor: zyxel model: vsg1435-b101
vendor: zyxel model: fr1000z
vendor: zyxel model: nwa1100-nh
vendor: zyxel model: gs1900-24
vendor: zyxel model: zynos
vendor: zyxel model: prestige 642r
vendor: zyxel model: p-870h-51
vendor: zyxel model: vmg1312-b30b
vendor: zyxel model: multy x
vendor: zyxel model: nwa3560-n
vendor: zyxel model: nas 326
vendor: zyxel model: nsa325
vendor: zyxel model: usg60
vendor: zyxel model: vmg1312-b30a
vendor: zyxel model: prestige
vendor: zyxel model: gs1900-8
vendor: zyxel model: pk5001z
vendor: zyxel model: wap6806
vendor: zyxel model: atp200
vendor: zyxel model: nwa1123-ac
vendor: zyxel model: q1000
vendor: zyxel model: p-663hn-51
vendor: zyxel model: xgs2210-52hp
vendor: zyxel model: nsa320s
vendor: zyxel model: adsl router
vendor: zyxel model: nsa220
vendor: zyxel model: nbg6716
vendor: zyxel model: nas520
vendor: zyxel model: nsa221
vendor: zyxel model: atp800
vendor: zyxel model: gs1900-8hp firmware
vendor: zyxel model: nsa325v2
vendor: zyxel model: vmg8924-b10a
vendor: zyxel model: zywall 310
vendor: zyxel model: usg20-vpn
vendor: zyxel model: wre6505
vendor: zyxel model: gs1900-8hp
vendor: zyxel model: p-660hw v3
vendor: zyxel model: nsa310
vendor: zyxel model: pmg5318-b20a
vendor: zyxel model: atp500
vendor: zyxel model: usg210
vendor: zyxel model: usg1900
vendor: zyxel model: usg310
vendor: zyxel model: usg60w
vendor: zyxel model: p660hn-t1a v1
vendor: zyxel model: p8702n
vendor: zyxel model: vmg1312-b10a
vendor: zyxel model: nas540
vendor: zyxel model: nsa325 v2
vendor: zyxel model: p-660hw-t1
vendor: zyxel model: nwa1123-ni
vendor: zyxel model: p-330w router
vendor: zyxel model: nas542
vendor: zyxel model: sbg3500-n000
vendor: zyxel model: p-660hw-t1 2
vendor: zyxel model: vmg3312-b10b
vendor: zyxel model: zywall
vendor: zyxel model: p-330w
vendor: zyxel model: p-660hw
vendor: zyxel model: nas326
vendor: zyxel model: ac3000
vendor: zyxel model: vmg8324-b10a
vendor: zyxel model: dsl-491hnu-b1b v2
vendor: zyxel model: emg2926
vendor: zyxel model: usg50
vendor: zyxel model: n300 netusb nbg-419n
vendor: zyxel model: nsa310s
vendor: zyxel model: usg2200-vpn
vendor: zyxel model: prestige 660h-61
vendor: zyxel model: usg40
vendor: zyxel model: nsa320
vendor: zyxel model: vmg4380-b10a
vendor: zyxel model: p-870h-51 dsl router
vendor: zyxel model: nwa1121-ni
vendor: zyxel model: p-335wt router
vendor: zyxel model: p660hn-t1a v2
vendor: zyxel model: nwa1100-n
vendor: zyxel model: zywall 1100
vendor: zyxel model: p-660hn-51
vendor: zyxel model: usg2200
vendor: zyxel model: usg1100
vendor: zyxel model: vmg3312 b10b
vendor: zyxel model: zywall 110
vendor: zyxel model: usg20w-vpn
vendor: zyxel model: nbg-418n
vendor: zyxel model: c1000z
vendor: zyxel model: usg110
vendor: zyxel model: vmg5313-b30b
vendor: zyxel model: zyxel xgs2210-52hp
vendor: d-link model: router
vendor: netgear model: router
vendor: netgear model: rt314
vendor: netgear model: n300
vendor: netgear model: rt311
vendor: huawei model: huawei
vendor: huawei model: mt882
vendor: huawei model: usg2200
db: NVD ids: CVE-2022-0734, CVE-2014-0354, CVE-2020-15321, CVE-2022-45439, CVE-2019-15804, CVE-2020-15318, CVE-2013-3588, CVE-2022-38546, CVE-2019-7391, CVE-2018-18754, CVE-2011-0746, CVE-2017-18371, CVE-2022-40602, CVE-2018-1164, CVE-2020-15330, CVE-2023-33009, CVE-2023-22921, CVE-2020-15324, CVE-2023-34138, CVE-2021-35035, CVE-2022-0556, CVE-2015-6016, CVE-2023-27988, CVE-2020-25014, CVE-2005-3724, CVE-2020-29299, CVE-2021-46387, CVE-2023-22916, CVE-2020-15335, CVE-2017-7964, CVE-2004-1540, CVE-2008-1523, CVE-2008-1259, CVE-2008-1526, CVE-2007-4319, CVE-2008-1527, CVE-2008-1525, CVE-2008-1254, CVE-2008-1255, CVE-2020-15329, CVE-2023-27992, CVE-2023-35137, CVE-2015-6018, CVE-2002-0438, CVE-2022-2030, CVE-2023-27990, CVE-2021-4030, CVE-2022-0823, CVE-2021-35036, CVE-2020-15345, CVE-2020-15327, CVE-2022-43393, CVE-2021-35034, CVE-2020-15325, CVE-2020-15333, CVE-2008-1522, CVE-2022-0342, CVE-2020-15313, CVE-2023-28770, CVE-2020-15334, CVE-2019-17354, CVE-2019-10631, CVE-2023-37925, CVE-2020-15331, CVE-2019-15802, CVE-2019-15803, CVE-2018-15602, CVE-2022-43390, CVE-2019-10633, CVE-2017-15226, CVE-2022-26414, CVE-2021-35030, CVE-2020-15315, CVE-2018-5330, CVE-2020-13364, CVE-2019-6725, CVE-2023-4397, CVE-2023-27991, CVE-2020-29583, CVE-2023-33013, CVE-2005-0328, CVE-2022-43389, CVE-2023-22919, CVE-2023-5960, CVE-2019-12583, CVE-2018-14893, CVE-2015-7283, CVE-2023-37927, CVE-2023-34139, CVE-2023-28768, CVE-2023-33011, CVE-2023-34140, CVE-2021-35029, CVE-2019-13495, CVE-2001-1135, CVE-2023-37928, CVE-2020-15316, CVE-2019-9955, CVE-2020-15326, CVE-2020-15320, CVE-2022-30526, CVE-2008-1160, CVE-2006-0302, CVE-2021-35031, CVE-2017-18374, CVE-2023-22915, CVE-2020-15332, CVE-2021-4039, CVE-2014-4162, CVE-2022-34746, CVE-2020-15343, CVE-2011-4504, CVE-2002-1071, CVE-2020-15314, CVE-2023-22920, CVE-2023-22924, CVE-2022-45854, CVE-2022-43392, CVE-2023-28771, CVE-2022-45440, CVE-2023-35139, CVE-2015-6019, CVE-2023-4473, CVE-2008-1257, CVE-2020-15337, CVE-2023-28769, CVE-2017-17901, CVE-2020-13365, CVE-2020-15348, CVE-2007-6729, CVE-2023-22913, CVE-2018-9129, CVE-2019-6710, CVE-2023-34141, CVE-2007-4318, CVE-2022-45441, CVE-2023-4474, CVE-2020-15336, CVE-2019-12581, CVE-2022-43391, CVE-2018-19326, CVE-2020-15338, CVE-2021-35032, CVE-2023-37926, CVE-2015-6017, CVE-2002-1072, CVE-2022-0910, CVE-2020-9054, CVE-2007-6730, CVE-2020-15342, CVE-2023-22917, CVE-2022-40603, CVE-2020-15319, CVE-2020-15312, CVE-2006-3929, CVE-2022-38547, CVE-2020-15347, CVE-2023-28767, CVE-2023-22923, CVE-2023-35136, CVE-2020-15346, CVE-2017-18370, CVE-2007-4316, CVE-2019-15801, CVE-2023-5797, CVE-2006-2562, CVE-2008-1524, CVE-2004-1684, CVE-2020-15328, CVE-2023-33010, CVE-2017-18368, CVE-2023-35138, CVE-2015-7256, CVE-2005-3725, CVE-2021-35033, CVE-2020-15323, CVE-2020-15344, CVE-2008-1260, CVE-2017-17550, CVE-2020-15339, CVE-2020-15322, CVE-2008-1261, CVE-2020-24355, CVE-2020-28899, CVE-2015-6020, CVE-2023-22918, CVE-2019-10632, CVE-2019-15799, CVE-2008-1256, CVE-2023-5650, CVE-2022-26532, CVE-2015-7284, CVE-2022-26531, CVE-2013-6786, CVE-2021-35028, CVE-2019-15800, CVE-2008-1529, CVE-2008-1528, CVE-2023-22914, CVE-2017-6884, CVE-2019-10630, CVE-2020-24354, CVE-2019-15815, CVE-2008-1521, CVE-2021-4029, CVE-2023-43314, CVE-2020-15341, CVE-2014-0356, CVE-2001-1194, CVE-2020-15317, CVE-2018-14892, CVE-2016-10401, CVE-2022-45853, CVE-2014-0355, CVE-2022-34747, CVE-2014-7278, CVE-2014-0353, CVE-2005-1717, CVE-2023-22922, CVE-2014-7277, CVE-2023-33012, CVE-2022-26413, CVE-2023-4398, CVE-2008-2167, CVE-2023-35140, CVE-2018-9149, CVE-2023-27989, CVE-2019-10634, CVE-2020-14461, CVE-2021-3297, CVE-2020-15340, CVE-2021-35027, CVE-2007-4317, CVE-2022-30525, CVE-2016-10227