VARIoT news about IoT security

Trust: 3.0

Fetched: Jan. 7, 2024, 9:30 a.m., Published: April 7, 2019, midnight
Vulnerabilities: -
Affected productsExternal IDs
vendor: google model: android

Trust: 3.5

Fetched: Jan. 7, 2024, 9:22 a.m., Published: Oct. 10, 2023, midnight
Vulnerabilities: memory corruption, information leak, privilege escalation...
Affected productsExternal IDs
db: NVD ids: CVE-2023-29360, CVE-2023-36802

Trust: 3.25

Fetched: Jan. 7, 2024, 9:20 a.m., Published: Jan. 7, 2024, 9:20 a.m.
Vulnerabilities: cross-site scripting, sql injection, default password
Affected productsExternal IDs
vendor: trend model: antivirus
vendor: trend model: security
vendor: clamav model: clamav
vendor: trend micro model: antivirus
vendor: trend micro model: security
vendor: clam model: clamav
vendor: tripwire model: ip360
vendor: wireshark model: wireshark

Trust: 6.0

Fetched: Jan. 7, 2024, 9:20 a.m., Published: Nov. 2, 2023, 1:53 a.m.
Vulnerabilities: command injection
Affected productsExternal IDs
vendor: cisco model: firepower threat defense
vendor: cisco model: firepower
vendor: cisco model: firepower management center
db: NVD ids: CVE-2023-20048

Trust: 5.0

Fetched: Jan. 7, 2024, 9:18 a.m., Published: Nov. 21, 2023, 9:29 p.m.
Vulnerabilities: security bypass
Affected productsExternal IDs
db: NVD ids: CVE-2023-24880, CVE-2023-32049, CVE-2023-36025

Trust: 5.25

Fetched: Jan. 7, 2024, 9:15 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: service crash, application crash, memory corruption...
Affected productsExternal IDs
vendor: f-prot model: f-prot antivirus
vendor: sophos model: anti-virus
vendor: sophos model: endpoint protection
vendor: sophos model: sophos anti-virus
vendor: sophos model: firewall
vendor: rising model: rising antivirus
vendor: rising model: antivirus
vendor: clamav model: clamav
vendor: clam model: clamav
vendor: cisco model: advanced malware protection
vendor: cisco model: email security appliance
vendor: cisco model: cisco email security appliance
vendor: cisco model: web security appliance
vendor: cisco model: 1100
vendor: cisco model: clamav
vendor: symantec model: antivirus
vendor: symantec model: endpoint protection
vendor: symantec model: web security
vendor: symantec model: symantec endpoint protection
vendor: esafe model: antivirus
vendor: avira model: antivirus
vendor: avira model: antivir
vendor: jiangmin model: jiangmin
vendor: jiangmin model: jiangmin antivirus
vendor: jiangmin model: antivirus
vendor: comodo model: antivirus
vendor: comodo model: comodo antivirus
vendor: comodo model: firewall
vendor: comodo model: internet security
vendor: emsisoft model: anti-malware
vendor: emsisoft model: antivirus
vendor: emsisoft model: emsisoft anti-malware
vendor: avast model: anti-virus
vendor: avast model: antivirus
vendor: quick heal model: quick heal
vendor: trend model: housecall
vendor: trend model: virusbuster
vendor: trend model: antivirus
vendor: trend model: trend micro housecall
vendor: trend model: internet security
vendor: trend model: trend micro antivirus
vendor: trend model: security
vendor: trend model: micro housecall
vendor: squid model: squid
vendor: ahnlab model: engine
vendor: ahnlab model: v3 internet security
vendor: trend micro model: housecall
vendor: trend micro model: virusbuster
vendor: trend micro model: antivirus
vendor: trend micro model: trend micro housecall
vendor: trend micro model: internet security
vendor: trend micro model: trend micro antivirus
vendor: trend micro model: security
vendor: trend micro model: micro housecall
vendor: gibraltar model: firewall
vendor: gibraltar model: gibraltar firewall
vendor: antiy model: avl sdk
vendor: apple model: apple mac os x
vendor: apple model: mac os x
vendor: apple model: mac os
vendor: antiy labs model: avl sdk
vendor: ikarus model: ikarus virus utilities t3 command line scanner
vendor: ikarus model: virus utilities t3 command line scanner
vendor: norman model: antivirus
vendor: norman model: norman antivirus
vendor: nprotect model: anti-virus
vendor: nprotect model: antivirus
vendor: nprotect model: nprotect anti-virus
db: NVD ids: CVE-2007-4510, CVE-2008-6680, CVE-2021-1252, CVE-2010-4260, CVE-2008-5313, CVE-2003-0946, CVE-2007-0897, CVE-2010-1639, CVE-2015-1463, CVE-2022-20803, CVE-2008-1837, CVE-2005-2056, CVE-2008-5314, CVE-2005-1795, CVE-2018-20902, CVE-2015-2222, CVE-2019-1788, CVE-2022-20698, CVE-2012-1443, CVE-2013-7088, CVE-2016-1371, CVE-2007-3023, CVE-2012-1457, CVE-2012-2243, CVE-2008-2713, CVE-2006-1615, CVE-2007-0898, CVE-2006-0162, CVE-2014-9050, CVE-2008-3914, CVE-2005-1922, CVE-2012-1459, CVE-2010-3434, CVE-2017-12376, CVE-2020-3350, CVE-2008-1100, CVE-2017-12380, CVE-2018-0360, CVE-2007-3725, CVE-2022-20792, CVE-2019-12900, CVE-2005-2070, CVE-2008-1389, CVE-2007-6596, CVE-2022-20796, CVE-2021-27506, CVE-2019-15961, CVE-2016-1405, CVE-2010-1311, CVE-2008-6845, CVE-2007-3025, CVE-2007-1997, CVE-2005-1923, CVE-2017-12379, CVE-2005-3587, CVE-2008-1836, CVE-2008-5312, CVE-2023-20032, CVE-2014-9328, CVE-2015-2170, CVE-2006-6406, CVE-2015-2668, CVE-2008-3912, CVE-2017-11423, CVE-2007-6337, CVE-2008-3913, CVE-2015-1461, CVE-2006-1614, CVE-2018-11196, CVE-2018-20873, CVE-2017-12374, CVE-2008-3215, CVE-2010-4261, CVE-2007-2650, CVE-2013-2021, CVE-2017-6419, CVE-2005-3239, CVE-2019-12625, CVE-2005-0133, CVE-2017-12378, CVE-2011-3627, CVE-2010-4479, CVE-2017-6420, CVE-2004-1909, CVE-2008-1387, CVE-2005-2920, CVE-2005-2450, CVE-2022-20771, CVE-2004-1876, CVE-2006-5874, CVE-2019-1787, CVE-2007-6745, CVE-2009-1270, CVE-2007-6029, CVE-2019-1789, CVE-2010-1640, CVE-2009-1601, CVE-2006-1630, CVE-2012-3501, CVE-2010-0058, CVE-2008-1833, CVE-2007-6336, CVE-2005-3303, CVE-2020-7613, CVE-2007-6335, CVE-2015-1462, CVE-2008-1835, CVE-2015-2221, CVE-2007-4560, CVE-2012-2244, CVE-2018-0202, CVE-2008-5525, CVE-2016-1372, CVE-2007-3123, CVE-2017-6418, CVE-2013-6497, CVE-2009-1241, CVE-2023-20197, CVE-2022-20785, CVE-2018-1000085, CVE-2008-0318, CVE-2019-1786, CVE-2022-20770, CVE-2006-5295, CVE-2012-1419, CVE-2006-4613, CVE-2018-15378, CVE-2021-1404, CVE-2017-12375, CVE-2007-3122, CVE-2011-1003, CVE-2019-1785, CVE-2007-1745, CVE-2006-2427, CVE-2006-1989, CVE-2023-20052, CVE-2007-6595, CVE-2013-2020, CVE-2009-1372, CVE-2008-0314, CVE-2006-4182, CVE-2005-1711, CVE-2004-0270, CVE-2007-3024, CVE-2021-1386, CVE-2010-0098, CVE-2020-3341, CVE-2012-1458, CVE-2005-0218, CVE-2020-3327, CVE-2005-3500, CVE-2008-5140, CVE-2020-3481, CVE-2020-3123, CVE-2013-7087, CVE-2021-1405, CVE-2005-3501, CVE-2017-12377, CVE-2019-1798, CVE-2006-4018, CVE-2018-0361, CVE-2006-6481, CVE-2005-3229, CVE-2006-5745, CVE-2011-2721, CVE-2008-5050, CVE-2005-2919, CVE-2007-2029, CVE-2008-0728, CVE-2009-1371, CVE-2023-20212, CVE-2013-7089

Trust: 3.75

Fetched: Jan. 7, 2024, 9:10 a.m., Published: Nov. 1, 2023, 3:59 p.m.
Vulnerabilities: command injection
Affected productsExternal IDs
vendor: cisco model: cisco firepower management center
vendor: cisco model: firepower
vendor: cisco model: firepower management center
vendor: cisco model: asa software

Trust: 4.0

Fetched: Jan. 7, 2024, 9:09 a.m., Published: Nov. 1, 2023, 4 p.m.
Vulnerabilities: code injection
Affected productsExternal IDs
vendor: cisco model: cisco firepower threat defense software
vendor: cisco model: firepower threat defense
vendor: cisco model: cisco firepower management center
vendor: cisco model: firepower
vendor: cisco model: firepower threat defense software
vendor: cisco model: firepower management center
vendor: cisco model: asa software

Trust: 5.75

Fetched: Jan. 5, 2024, 10:17 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: remote command injection, command injection
Affected productsExternal IDs
vendor: barracuda model: barracuda
db: NVD ids: CVE-2023-2868

Trust: 3.0

Fetched: Jan. 5, 2024, 10:17 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: -
Affected productsExternal IDs
db: NVD ids: CVE-2022-36804

Trust: 6.25

Fetched: Jan. 5, 2024, 10:16 a.m., Published: Jan. 4, 2024, 10:41 p.m.
Vulnerabilities: denial of service
Affected productsExternal IDs
vendor: apple model: macos
db: NVD ids: CVE-2023-41974

Trust: 3.25

Fetched: Jan. 5, 2024, 10:15 a.m., Published: Jan. 3, 2024, 10:24 a.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: check point model: check point

Trust: 3.5

Fetched: Jan. 5, 2024, 10:14 a.m., Published: Nov. 28, 2023, 9:52 a.m.
Vulnerabilities: cross-site scripting, sql injection, account lockout...
Affected productsExternal IDs
Related entries in the VARIoT vulnerabilities database: VAR-202401-0655

Trust: 4.75

Fetched: Jan. 5, 2024, 10:14 a.m., Published: Jan. 3, 2024, 10:47 p.m.
Vulnerabilities: memory corruption, buffer overflow, code execution...
Affected productsExternal IDs
db: NVD ids: CVE-2023-33030, CVE-2023-33025, CVE-2023-33032

Trust: 4.25

Fetched: Jan. 5, 2024, 9:52 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: directory traversal, information disclosure, denial of service...
Affected productsExternal IDs
vendor: apple model: mac os
vendor: apple model: mac os x
vendor: apple model: apple mac os x
vendor: dropbear model: ssh server
vendor: zoho model: manageengine servicedesk plus
vendor: typo3 model: typo3
vendor: citrix model: gateway
vendor: citrix model: sd-wan
vendor: meinberg model: lantime m300
vendor: meinberg model: lantime
vendor: peplink model: 2500
vendor: peplink model: balance
vendor: peplink model: balance 305
vendor: proftpd model: proftpd
vendor: moxa model: thingspro
vendor: mailsite model: rockliffe
vendor: cisco model: cisco ios xr
vendor: cisco model: cisco sd-wan
vendor: cisco model: webex meetings server
vendor: cisco model: webex meetings
vendor: cisco model: series
vendor: cisco model: webex support center
vendor: cisco model: meeting
vendor: cisco model: cisco webex
vendor: cisco model: webex meeting server
vendor: cisco model: cisco ios
vendor: cisco model: cisco webex meetings server
vendor: cisco model: cisco unified communications domain manager
vendor: cisco model: meeting server
vendor: cisco model: ios xr
vendor: cisco model: cisco unified communications manager
vendor: cisco model: webex event center
vendor: cisco model: cisco webex support center
vendor: cisco model: meetings server
vendor: cisco model: sd-wan vmanage software
vendor: cisco model: sd-wan
vendor: cisco model: unified communications
vendor: cisco model: cisco webex training center
vendor: cisco model: cisco connected mobile experiences
vendor: cisco model: cisco webex meetings
vendor: cisco model: unified communications domain manager
vendor: cisco model: webex
vendor: cisco model: ios xr software
vendor: cisco model: cisco webex event center
vendor: cisco model: cisco webex meeting center
vendor: cisco model: sd-wan vmanage
vendor: cisco model: umbrella
vendor: cisco model: unified communications manager
vendor: cisco model: webex training center
vendor: cisco model: webex meeting center
vendor: cisco model: connected mobile experiences
vendor: aviatrix model: gateway
vendor: aviatrix model: controller
vendor: watchguard model: watchguard fireware
vendor: watchguard model: firebox
vendor: watchguard model: fireware
vendor: rockliffe model: mailsite
vendor: zabbix model: zabbix
db: NVD ids: CVE-2019-14351, CVE-2022-2939, CVE-2003-0343, CVE-2023-22359, CVE-2022-41697, CVE-2022-34623, CVE-2009-0167, CVE-2006-0129, CVE-2021-40126, CVE-2012-5615, CVE-2020-27199, CVE-2020-26034, CVE-2003-0342, CVE-2022-2416, CVE-2022-39314, CVE-2021-22003, CVE-2014-3278, CVE-2021-1486, CVE-2014-3286, CVE-2020-7918, CVE-2020-1717, CVE-2006-2247, CVE-2021-43194, CVE-2022-40292, CVE-2019-19677, CVE-2007-2768, CVE-2022-38755, CVE-2022-24633, CVE-2023-3221, CVE-2004-1697, CVE-2021-46434, CVE-2022-40895, CVE-2020-24008, CVE-2023-36127, CVE-2020-9389, CVE-2023-31186, CVE-1999-0990, CVE-2021-36721, CVE-2022-23342, CVE-2018-20170, CVE-2010-3195, CVE-2023-40761, CVE-2023-3897, CVE-2021-37151, CVE-2023-43623, CVE-2019-15987, CVE-2016-20012, CVE-2015-0597, CVE-2004-1602, CVE-2017-8835, CVE-2023-26071, CVE-2023-23838, CVE-2023-38357, CVE-2021-29621, CVE-2001-1483, CVE-2019-3990, CVE-2014-8034, CVE-2023-34261, CVE-2021-41634, CVE-2023-50858, CVE-2020-6371, CVE-2020-13413, CVE-2019-6122, CVE-2014-8035, CVE-2020-28206, CVE-2021-44876, CVE-2019-15132, CVE-2018-15473, CVE-2023-40758, CVE-2014-9247, CVE-2022-22702, CVE-2023-30458, CVE-2018-13361, CVE-2023-40760, CVE-2021-1143, CVE-2022-39315, CVE-2018-15919, CVE-2006-0130, CVE-2019-7217, CVE-2022-2827, CVE-2023-38871, CVE-2015-4845, CVE-2009-0142, CVE-2016-1410, CVE-2021-39125, CVE-2014-3279, CVE-2023-3336, CVE-2022-3880, CVE-2000-0089, CVE-2019-15045, CVE-2023-33562, CVE-2023-36135, CVE-2018-5682, CVE-2005-1133, CVE-2018-1000126, CVE-2023-3462, CVE-2017-18536, CVE-2023-40764, CVE-2020-7240, CVE-2023-49274, CVE-2013-6182, CVE-2020-35614, CVE-2023-25192, CVE-2018-10210, CVE-2020-28185, CVE-2007-0310, CVE-2020-15392, CVE-2018-15599, CVE-2018-18602, CVE-2016-6210, CVE-2022-24032, CVE-2009-0580, CVE-2023-40765, CVE-2016-4158, CVE-2014-4156, CVE-2016-20003, CVE-2018-18390, CVE-2021-4191, CVE-2019-4068, CVE-2023-40766, CVE-2023-4095, CVE-2020-4244, CVE-2019-0405, CVE-2022-40482, CVE-2016-1542, CVE-2021-41239, CVE-2022-21659, CVE-2023-40763, CVE-2020-35177, CVE-2020-7962, CVE-2015-4194, CVE-2003-0402, CVE-2023-40757, CVE-2017-8055, CVE-2023-40767, CVE-2017-1000226, CVE-2023-48028, CVE-2023-46237, CVE-2019-16516, CVE-2023-28015, CVE-2021-44875, CVE-2021-22257, CVE-2020-11576, CVE-2023-40759, CVE-2019-6120, CVE-2023-40756, CVE-2023-36141, CVE-2021-39118, CVE-2005-2591, CVE-2020-11063, CVE-2021-31159, CVE-2013-0513, CVE-2014-4634, CVE-2022-37146, CVE-2019-1842, CVE-2014-8000, CVE-2023-40762, CVE-2007-2243, CVE-2023-47102

Trust: 3.5

Fetched: Jan. 5, 2024, 9:44 a.m., Published: Oct. 26, 2023, 4:35 p.m.
Vulnerabilities: -
Affected productsExternal IDs
vendor: apple model: mac os
vendor: apple model: macos
vendor: palo model: networks
vendor: tripwire model: ip360
db: NVD ids: CVE-2023-27350

Trust: 5.75

Fetched: Jan. 5, 2024, 9:36 a.m., Published: Dec. 22, 2023, midnight
Vulnerabilities: buffer overflow
Affected productsExternal IDs
vendor: google model: chrome
vendor: google model: android
db: NVD ids: CVE-2023-7024

Trust: 5.5

Fetched: Jan. 5, 2024, 9:35 a.m., Published: Dec. 8, 2023, 1:38 p.m.
Vulnerabilities: code execution, authentication vulnerability
Affected productsExternal IDs
db: NVD ids: CVE-2023-6248
Related entries in the VARIoT vulnerabilities database: VAR-202302-0195, VAR-202302-0482

Trust: 4.5

Fetched: Jan. 5, 2024, 9:34 a.m., Published: Jan. 5, 2024, 7:03 a.m.
Vulnerabilities: buffer overflow, code execution
Affected productsExternal IDs
vendor: wibu-systems model: codemeter runtime
vendor: wibu-systems model: codemeter
vendor: rockwell model: factorytalk activation
vendor: rockwell model: factorytalk
vendor: rockwell model: automation factorytalk
vendor: rockwell automation model: factorytalk activation
vendor: rockwell automation model: factorytalk
vendor: rockwell automation model: automation factorytalk
vendor: unitronics model: visilogic
vendor: wibu model: codemeter runtime
vendor: wibu model: codemeter
db: NVD ids: CVE-2023-38433, CVE-2023-0286, CVE-2023-39227, CVE-2023-6448, CVE-2022-4450, CVE-2022-4304
Related entries in the VARIoT vulnerabilities database: VAR-202009-0966, VAR-201111-0159, VAR-201809-0833, VAR-201705-3472, VAR-201809-0826, VAR-201809-0078, VAR-202102-0253, VAR-200505-0406, VAR-202007-0051, VAR-201504-0446, VAR-201809-0830, VAR-202001-1149, VAR-202210-1393, VAR-200705-0515, VAR-202010-0833, VAR-201508-0611, VAR-200708-0456, VAR-201809-0829, VAR-201111-0180, VAR-201111-0161, VAR-202002-1033, VAR-201809-0832, VAR-200607-0083, VAR-202111-0632, VAR-202203-1296, VAR-201907-1074, VAR-201809-0825, VAR-202112-2346, VAR-201912-1012, VAR-201906-0836, VAR-201809-0828, VAR-201906-0838, VAR-202007-0050, VAR-201111-0158, VAR-201907-0797, VAR-201502-0470, VAR-200610-0309, VAR-202210-1390, VAR-200605-0265, VAR-201805-0956, VAR-201111-0162, VAR-200607-0199, VAR-200708-0460, VAR-202011-0712, VAR-201910-0685, VAR-201111-0160, VAR-201301-0243, VAR-202210-1391, VAR-201808-0267, VAR-202007-0674, VAR-201507-0461, VAR-201906-0835, VAR-201809-0831, VAR-201809-0827, VAR-202101-1853, VAR-201812-0377, VAR-201309-0168, VAR-202006-0391, VAR-201809-0824, VAR-201809-0823, VAR-201807-1344, VAR-201707-1306, VAR-202210-1392, VAR-201901-0839, VAR-201111-0178, VAR-201809-0820, VAR-201707-1044, VAR-201906-0771, VAR-202301-0652, VAR-200605-0268, VAR-201307-0443, VAR-200705-0518, VAR-202108-0848, VAR-201809-0834, VAR-201809-0822, VAR-201111-0179, VAR-200605-0266, VAR-201906-0587, VAR-201707-1045, VAR-202104-1074, VAR-201906-0839, VAR-201411-0177, VAR-202001-0840, VAR-202104-1463, VAR-201809-0821, VAR-200605-0267

Trust: 5.25

Fetched: Jan. 5, 2024, 9:31 a.m., Published: Jan. 3, 2024, midnight
Vulnerabilities: cross-site scripting, directory traversal, information disclosure...
Affected productsExternal IDs
vendor: securifi model: almond 2015
vendor: securifi model: almond
vendor: securifi model: securifi almond
vendor: apple model: mdnsresponder
vendor: apple model: mac os
vendor: apple model: mac os x
vendor: apple model: apple mac os x
vendor: edimax model: plug
vendor: edimax model: br-6104k router
vendor: edimax model: br-6104k
vendor: edimax model: 6114wg
vendor: sonos model: sonos
vendor: sonos model: connect
vendor: canyon model: cn-wf512
vendor: canyon model: cn-wf514
vendor: green packet model: green packet dx-350 firmware
vendor: green packet model: dx-350
vendor: green packet model: green packet dx-350
vendor: linksys model: wrt54gl
vendor: linksys model: wrt54gx
vendor: linksys model: wrt54g
vendor: linksys model: wrt54gs
vendor: thomson model: speedtouch
vendor: zyxel model: p-330w
vendor: zyxel model: p-335wt router
vendor: compal model: networks
vendor: compal model: cg6640e wireless gateway
vendor: abode model: gateway
vendor: tp-link model: tl-wr886n
vendor: tp-link model: gateway
vendor: tp-link model: routers
vendor: mercusys model: mercury x18g
vendor: belkin model: belkin wemo switch
vendor: belkin model: wireless g router
vendor: belkin model: wemo switch 28b
vendor: belkin model: wemo switch
vendor: belkin model: n750
vendor: belkin model: n900
vendor: belkin model: wemo switch 28b ww_2.00.11057.pvt-owrt-sns
vendor: belkin model: router
vendor: swisscom model: internet-box light
vendor: compal broadband networks model: networks
vendor: compal broadband networks model: cg6640e wireless gateway
vendor: hospira model: lifecare pca infusion system
vendor: green model: packet dx-350
vendor: netgear model: r7800
vendor: netgear model: r6400v2
vendor: netgear model: xr450
vendor: netgear model: wndr3400v3
vendor: netgear model: r6700 v1.0.4.84_10.0.58
vendor: netgear model: r8900
vendor: netgear model: wn3000rpv2
vendor: netgear model: lbr20
vendor: netgear model: wn3000rpv3
vendor: netgear model: xr700
vendor: netgear model: xr500
vendor: netgear model: ex2700
vendor: netgear model: r9000
vendor: netgear model: d7800
vendor: netgear model: r6700
vendor: netgear model: router
vendor: netgear model: netgear r6700 v1.0.4.84_10.0.58
vendor: d-link model: tesco dcs-2121 1.05_tesco
vendor: d-link model: dcs-2121
vendor: d-link model: di-784
vendor: d-link model: di-604 broadband router
vendor: d-link model: dir-802
vendor: d-link model: dcs-1130
vendor: d-link model: dir-816l
vendor: d-link model: dcs-1100
vendor: d-link model: dsr-1000n
vendor: d-link model: di-604
vendor: d-link model: dir-859
vendor: d-link model: dcs-2121 1.06_fr
vendor: d-link model: ebr-2310 ethernet broadband router
vendor: d-link model: dsr-250
vendor: d-link model: dir-615
vendor: d-link model: tesco dcs-2102 1.05_tesco
vendor: d-link model: wbr-1310
vendor: d-link model: di-524
vendor: d-link model: router
vendor: d-link model: ethernet broadband router
vendor: d-link model: dsl-g624t
vendor: d-link model: wbr-1310 wireless g router
vendor: d-link model: wbr-2310 rangebooster g router
vendor: d-link model: di-624
vendor: d-link model: wbr-2310
vendor: d-link model: dcs-2102 1.06_fr
vendor: d-link model: dcs-2102
vendor: foscam model: thomson
vendor: foscam model: system
vendor: foscam model: c1 indoor hd camera
vendor: dahua model: camera
vendor: genexis model: platinum 4410
vendor: genexis model: platinum
vendor: terramaster model: f2-210
vendor: synology model: dns server
vendor: technicolor model: tg585 firmware
vendor: technicolor model: tg585
vendor: wrt54g model: linksys
vendor: broadcom model: broadcom linux
vendor: broadcom model: linux
vendor: cisco model: rv130w
vendor: cisco model: dpc3939
vendor: cisco model: series
vendor: cisco model: cvr100w
vendor: cisco model: rv215w
vendor: cisco model: rv130
vendor: cisco model: cisco cvr100w wireless-n vpn router
vendor: cisco model: rv110w
vendor: cisco model: linksys wrt54gx
vendor: cisco model: linksys
vendor: cisco model: router
vendor: cisco model: wrt54gl
vendor: cisco model: 1100
vendor: cisco model: cvr100w wireless-n vpn router
vendor: cisco model: small business
vendor: cisco model: wrt54gx
vendor: cisco model: cisco small business
vendor: cisco model: linksys wrt54g
vendor: cisco model: wrt54g
vendor: cisco model: routers
vendor: cisco model: wrt54gs
vendor: canyon-tech model: cn-wf512
vendor: canyon-tech model: cn-wf514
vendor: micasaverde model: veraedge
vendor: micasaverde model: veralite firmware
vendor: micasaverde model: veralite
vendor: abode systems model: gateway
vendor: siemens model: speedstream wireless router
vendor: siemens model: speedstream
vendor: vera model: veraedge
vendor: vera model: veralite firmware
vendor: vera model: veralite
vendor: sweex model: lb000021
vendor: freebox model: server
vendor: freebox model: freebox server
vendor: sitecom model: wl-153 router firmware
vendor: sitecom model: wl-111
vendor: sitecom model: wl-153 router
vendor: sitecom model: wl-153
db: NVD ids: CVE-2020-24373, CVE-2021-35393, CVE-2021-31718, CVE-2011-4503, CVE-2020-23622, CVE-2018-17017, CVE-2012-5962, CVE-2021-33516, CVE-2017-3882, CVE-2018-17010, CVE-2023-31998, CVE-2013-0229, CVE-2017-2879, CVE-2018-11946, CVE-2008-1654, CVE-2020-18568, CVE-2005-0833, CVE-2023-27217, CVE-2020-10924, CVE-2012-5961, CVE-2015-3459, CVE-2018-17014, CVE-2013-4863, CVE-2012-5965, CVE-2022-35879, CVE-2007-2386, CVE-2020-24375, CVE-2013-1462, CVE-2015-2984, CVE-2021-26899, CVE-2009-2174, CVE-2019-12107, CVE-2007-3744, CVE-2018-17013, CVE-2005-2120, CVE-2011-4501, CVE-2011-4505, CVE-2013-0274, CVE-2020-5524, CVE-2018-13415, CVE-2018-17016, CVE-2005-3644, CVE-2006-3344, CVE-2021-34991, CVE-2022-26997, CVE-2012-5963, CVE-2017-8414, CVE-2018-17009, CVE-2021-45603, CVE-2001-0876, CVE-2019-17621, CVE-2017-9392, CVE-2018-17012, CVE-2017-9382, CVE-2020-10923, CVE-2011-4502, CVE-2001-0877, CVE-2019-14363, CVE-2016-5301, CVE-2015-0869, CVE-2021-29462, CVE-2020-24376, CVE-2006-5537, CVE-2016-8863, CVE-2022-35878, CVE-2011-1165, CVE-2006-0023, CVE-2006-2559, CVE-2018-8914, CVE-2020-1598, CVE-2018-15506, CVE-2020-28926, CVE-2018-13416, CVE-2011-4506, CVE-2006-3687, CVE-2007-3748, CVE-2006-6296, CVE-2020-25988, CVE-2019-17532, CVE-2011-4504, CVE-2013-0230, CVE-2022-35881, CVE-2018-15875, CVE-2023-45576, CVE-2018-13417, CVE-2012-5959, CVE-2021-35392, CVE-2020-15893, CVE-2012-5958, CVE-2014-5406, CVE-2017-9391, CVE-2018-17015, CVE-2018-17011, CVE-2020-1430, CVE-2019-16903, CVE-2021-23242, CVE-2020-13848, CVE-2012-5960, CVE-2018-16596, CVE-2013-3613, CVE-2020-12695, CVE-2020-0781, CVE-2019-1405, CVE-2018-17008, CVE-2018-17007, CVE-2020-1354, CVE-2018-11316, CVE-2015-6031, CVE-2008-2957, CVE-2017-9930, CVE-2007-1204, CVE-2020-19858, CVE-2022-35880, CVE-2018-16195, CVE-2011-4499, CVE-2016-6255, CVE-2018-17004, CVE-2017-9479, CVE-2017-8330, CVE-2022-43972, CVE-2022-47848, CVE-2013-1461, CVE-2006-2562, CVE-2020-0783, CVE-2013-5006, CVE-2015-4141, CVE-2007-2390, CVE-2020-1519, CVE-2021-34730, CVE-2001-0721, CVE-2012-5964, CVE-2007-0357, CVE-2018-17018, CVE-2018-17006, CVE-2011-4500, CVE-2006-2560, CVE-2019-12780, CVE-2017-9480, CVE-2021-30127, CVE-2017-9383, CVE-2014-8654, CVE-2013-1600, CVE-2021-29379, CVE-2020-1538, CVE-2018-17005, CVE-2006-2561