Vulnerabilities (CVE)

Filtered by vendor Intelbras Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-6103 1 Intelbras 2 Rx 1500, Rx 1500 Firmware 2023-11-20 N/A 5.4 MEDIUM
A vulnerability has been found in Intelbras RX 1500 1.1.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /WiFi.html of the component SSID Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-245065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2020-12262 1 Intelbras 6 Tip200, Tip200 Firmware, Tip200lite and 3 more 2020-12-08 3.5 LOW 5.4 MEDIUM
Intelbras TIP200 60.61.75.15, TIP200LITE 60.61.75.15, and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.
CVE-2020-13886 1 Intelbras 6 Tip200, Tip200 Firmware, Tip200lite and 3 more 2020-12-08 5.0 MEDIUM 5.3 MEDIUM
Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.
CVE-2019-19516 1 Intelbras 2 Wrn 150, Wrn 150 Firmware 2019-12-13 4.3 MEDIUM 6.5 MEDIUM
Intelbras WRN 150 1.0.18 devices allow CSRF via GO=system_password.asp to the goform/SysToolChangePwd URI to change a password.
CVE-2019-17222 1 Intelbras 2 Wrn 150, Wrn 150 Firmware 2019-11-12 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered on Intelbras WRN 150 1.0.17 devices. There is stored XSS in the Service Name tab of the WAN configuration screen, leading to a denial of service (inability to change the configuration).
CVE-2018-17337 1 Intelbras 2 Nplug, Nplug Firmware 2018-11-28 4.3 MEDIUM 6.1 MEDIUM
Intelbras NPLUG 1.0.0.14 devices have XSS via a crafted SSID that is received via a network broadcast.
CVE-2017-14219 1 Intelbras 2 Wrn 240, Wrn 240 Firmware 2017-09-19 4.3 MEDIUM 6.1 MEDIUM
XSS (persistent) on the Intelbras Wireless N 150Mbps router with firmware WRN 240 allows attackers to steal wireless credentials without being connected to the network, related to userRpm/popupSiteSurveyRpm.htm and userRpm/WlanSecurityRpm.htm. The attack vector is a crafted ESSID, as demonstrated by an "airbase-ng -e" command.