Lucene search

K
CobhamExplorer 710 Firmware

6 matches found

CVE
CVE
added 2019/10/10 8:15 p.m.97 views

CVE-2019-9529

The web application portal of the Cobham EXPLORER 710, firmware version 1.07, has no authentication by default. This could allow an unauthenticated, local attacker connected to the device to access the portal and to make any change to the device.

5.5CVSS5.5AI score0.00171EPSS
CVE
CVE
added 2019/10/10 8:15 p.m.94 views

CVE-2019-9533

The root password of the Cobham EXPLORER 710 is the same for all versions of firmware up to and including v1.08. This could allow an attacker to reverse-engineer the password from available versions to gain authenticated access to the device.

10CVSS9.7AI score0.00633EPSS
CVE
CVE
added 2019/10/10 8:15 p.m.89 views

CVE-2019-9530

The web root directory of the Cobham EXPLORER 710, firmware version 1.07, has no access restrictions on downloading and reading all files. This could allow an unauthenticated, local attacker connected to the device to access and download any file found in the web root directory.

5.5CVSS5.4AI score0.00075EPSS
CVE
CVE
added 2019/10/10 8:15 p.m.86 views

CVE-2019-9531

The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to port 5454. This could allow an unauthenticated, remote attacker to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that provide unauthenticated, shel...

10CVSS9.7AI score0.01588EPSS
CVE
CVE
added 2019/10/10 8:15 p.m.86 views

CVE-2019-9534

The Cobham EXPLORER 710, firmware version 1.07, does not validate its firmware image. Development scripts left in the firmware can be used to upload a custom firmware image that the device runs. This could allow an unauthenticated, local attacker to upload their own firmware that could be used to i...

7.8CVSS7.5AI score0.00061EPSS
CVE
CVE
added 2019/10/10 8:15 p.m.85 views

CVE-2019-9532

The web application portal of the Cobham EXPLORER 710, firmware version 1.07, sends the login password in cleartext. This could allow an unauthenticated, local attacker to intercept the password and gain access to the portal.

7.8CVSS7.7AI score0.00079EPSS