ID | CVSS | Summary | Last (major) update | Published | |
CVE-2020-26201 | 10.0 |
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
|
06-08-2022 - 03:50 | 10-12-2020 - 23:15 | |
CVE-2020-15357 | 10.0 |
Network Analysis functionality in Askey AP5100W_Dual_SIG_1.01.097 and all prior versions allows remote attackers to execute arbitrary commands via a shell metacharacter in the ping, traceroute, or route options.
|
26-04-2022 - 16:12 | 11-12-2020 - 16:15 | |
CVE-2020-15023 | 4.3 |
Askey AP5100W devices through AP5100W_Dual_SIG_1.01.097 are affected by WPS PIN offline brute-force cracking. This arises because of issues with the random number selection for the Diffie-Hellman exchange. By capturing an attempted (and even failed)
|
06-08-2022 - 03:51 | 11-12-2020 - 16:15 |