Lucene search

K

Backhaul Radios Security Vulnerabilities

cve
cve

CVE-2017-9132

A hard-coded credentials issue was discovered on Mimosa Client Radios before 2.2.3, Mimosa Backhaul Radios before 2.2.3, and Mimosa Access Points before 2.2.3. These devices run Mosquitto, a lightweight message broker, to send information between devices. By using the vendor's hard-coded...

7.5CVSS

7.3AI Score

0.002EPSS

2017-05-21 09:29 PM
19
cve
cve

CVE-2017-9135

An issue was discovered on Mimosa Client Radios before 2.2.4 and Mimosa Backhaul Radios before 2.2.4. On the backend of the device's web interface, there are some diagnostic tests available that are not displayed on the webpage; these are only accessible by crafting a POST request with a program...

8.8CVSS

8.8AI Score

0.001EPSS

2017-05-21 09:29 PM
20
cve
cve

CVE-2017-9131

An issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. By connecting to the Mosquitto broker on an access point and one of its clients, an attacker can gather enough information to craft a command that reboots the client remotely when sent to the...

7.5CVSS

7.5AI Score

0.003EPSS

2017-05-21 09:29 PM
25
cve
cve

CVE-2017-9133

An issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. In the device's web interface, after logging in, there is a page that allows you to ping other hosts from the device and view the results. The user is allowed to specify which host to ping, but...

8.8CVSS

8.8AI Score

0.001EPSS

2017-05-21 09:29 PM
21
cve
cve

CVE-2017-9134

An information-leakage issue was discovered on Mimosa Client Radios before 2.2.3 and Mimosa Backhaul Radios before 2.2.3. There is a page in the web interface that will show you the device's serial number, regardless of whether or not you have logged in. This information-leakage issue is relevant.....

7.5CVSS

7.3AI Score

0.002EPSS

2017-05-21 09:29 PM
18
cve
cve

CVE-2017-9136

An issue was discovered on Mimosa Client Radios before 2.2.3. In the device's web interface, there is a page that allows an attacker to use an unsanitized GET parameter to download files from the device as the root user. The attacker can download any file from the device's filesystem. This can be.....

7.5CVSS

7.4AI Score

0.002EPSS

2017-05-21 09:29 PM
30