||Improper Restriction of Operations Within the Bounds of a Memory Buffer
|Heap-based buffer overflow may allow a remote attack in the DHCP client.
||Improper Input Validation
|Allows remote attackers to execute arbitrary code in the dropbear SSH function.
||Multiple vulnerabilities including buffer overflow, integer overflow etc.
|Vulnerabilities on outdated GNU C Library (glibc) may allow an attacker to cause different impacts remotely including denial of service and arbitrary code execution.
||Multiple vulnerabilities including improper restriction of operations, uncontrolled resource consumption, null pointer dereference, buffer overflow, out-of-bounds write, privilege controls, cross-site-scripting etc.
|Vulnerabilities on outdated Linux kernel that may allow an attacker to cause different impacts remotely including denial of service, memory consumption by sending large amounts of traffic, privilege escalation, inject arbitrary commands etc.
||Use of Hard-coded Cryptographic Key
("House of Keys" vulnerability)
|Embedded devices using non-unique X.509 certificates and SSH host keys can be leveraged in impersonation, man-in-the-middle, or passive decryption attacks.
||Multiple vulnerabilities including resource management error, buffer overflow, improper authentication, improper input validation etc.
|Vulnerabilities on an outdated OpenSSL module that may allow an attacker to remotely perform a denial-of-service attack or execute arbitrary code etc.
||Hardcoded password hashes
|Use of a hard-coded cryptographic key may increase the possibility of unauthorized access.
||Authenticated Command Injection
|A specially crafted command can cause privilege escalation and circumvent the operating system's user access controls.
||Reflected Cross-site scripting via manipulated config-file
|Allows an attacker to import a malicious config file to the device through the web interface.