Vulnerabilities (CVE)

Filtered by vendor Intelbras Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-6103 1 Intelbras 2 Rx 1500, Rx 1500 Firmware 2023-11-20 N/A 5.4 MEDIUM
A vulnerability has been found in Intelbras RX 1500 1.1.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /WiFi.html of the component SSID Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-245065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2021-32403 1 Intelbras 2 Rf 301k, Rf 301k Firmware 2022-01-01 6.8 MEDIUM 8.8 HIGH
Intelbras Router RF 301K Firmware 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) due to lack of security mechanisms for token protection and unsafe inputs and modules.
CVE-2018-9010 1 Intelbras 4 Tip200, Tip200 Firmware, Tip200lite and 1 more 2021-09-09 4.0 MEDIUM 7.2 HIGH
Intelbras TELEFONE IP TIP200/200 LITE 60.0.75.29 devices allow remote authenticated admins to read arbitrary files via the /cgi-bin/cgiServer.exx page parameter, aka absolute path traversal. In some cases, authentication can be achieved via the admin account with its default admin password.
CVE-2020-24285 1 Intelbras 4 Tip200, Tip200 Firmware, Tip200lite and 1 more 2021-09-09 5.0 MEDIUM 7.5 HIGH
INTELBRAS TELEFONE IP TIP200 version 60.61.75.22 allows an attacker to obtain sensitive information through /cgi-bin/cgiServer.exx.
CVE-2019-19996 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2021-07-21 7.8 HIGH 7.5 HIGH
An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login.
CVE-2021-32402 1 Intelbras 2 Rf 301k, Rf 301k Firmware 2021-05-25 6.8 MEDIUM 8.8 HIGH
Intelbras Router RF 301K Firmware 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) due to lack of validation and insecure configurations in inputs and modules.
CVE-2021-3017 1 Intelbras 4 Win 300, Win 300 Firmware, Wrn 342 and 1 more 2021-04-21 5.0 MEDIUM 7.5 HIGH
The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code.
CVE-2020-12262 1 Intelbras 6 Tip200, Tip200 Firmware, Tip200lite and 3 more 2020-12-08 3.5 LOW 5.4 MEDIUM
Intelbras TIP200 60.61.75.15, TIP200LITE 60.61.75.15, and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.
CVE-2020-13886 1 Intelbras 6 Tip200, Tip200 Firmware, Tip200lite and 3 more 2020-12-08 5.0 MEDIUM 5.3 MEDIUM
Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.
CVE-2019-19142 1 Intelbras 2 Wrn 240, Wrn 240 Firmware 2020-08-24 5.0 MEDIUM 7.5 HIGH
Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.
CVE-2019-19007 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2020-08-24 9.0 HIGH 7.2 HIGH
Intelbras IWR 3000N 1.8.7 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled, a related issue to CVE-2019-17600.
CVE-2019-11415 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2020-08-24 7.8 HIGH 7.5 HIGH
An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login.
CVE-2019-19517 1 Intelbras 2 Action Rf 1200, Action Rf 1200 Firmware 2020-05-07 6.8 MEDIUM 8.8 HIGH
Intelbras RF1200 1.1.3 devices allow CSRF to bypass the login.html form, as demonstrated by launching a scrapy process.
CVE-2020-8829 1 Intelbras 2 Cip 92200, Cip 92200 Firmware 2020-05-07 6.8 MEDIUM 8.8 HIGH
CSRF on Intelbras CIP 92200 devices allows an attacker to access the panel and perform scraping or other analysis.
CVE-2019-19995 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2020-01-15 9.3 HIGH 8.8 HIGH
A CSRF issue was discovered on Intelbras IWR 3000N 1.8.7 devices, leading to complete control of the router, as demonstrated by v1/system/user.
CVE-2019-20004 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2020-01-14 4.3 MEDIUM 8.8 HIGH
An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.
CVE-2019-19516 1 Intelbras 2 Wrn 150, Wrn 150 Firmware 2019-12-13 4.3 MEDIUM 6.5 MEDIUM
Intelbras WRN 150 1.0.18 devices allow CSRF via GO=system_password.asp to the goform/SysToolChangePwd URI to change a password.
CVE-2019-17600 1 Intelbras 2 Iwr 1000n, Iwr 1000n Firmware 2019-11-16 10.0 HIGH 9.8 CRITICAL
Intelbras IWR 1000N 1.6.4 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled.
CVE-2019-17222 1 Intelbras 2 Wrn 150, Wrn 150 Firmware 2019-11-12 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered on Intelbras WRN 150 1.0.17 devices. There is stored XSS in the Service Name tab of the WAN configuration screen, leading to a denial of service (inability to change the configuration).
CVE-2017-14942 1 Intelbras 2 Wrn 150, Wrn 150 Firmware 2019-10-03 7.5 HIGH 9.8 CRITICAL
Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.
CVE-2018-10369 1 Intelbras 2 Win 240, Win 240 Firmware 2019-10-03 10.0 HIGH 9.8 CRITICAL
A Cross-site scripting (XSS) vulnerability was discovered on Intelbras Win 240 V1.1.0 devices. An attacker can change the Admin Password without a Login.
CVE-2019-11416 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2019-05-06 9.3 HIGH 8.8 HIGH
A CSRF issue was discovered on Intelbras IWR 3000N 1.5.0 devices, leading to complete control of the router, as demonstrated by v1/system/user.
CVE-2019-11414 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2019-04-22 4.3 MEDIUM 8.8 HIGH
An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.
CVE-2018-12455 1 Intelbras 2 Nplug, Nplug Firmware 2018-11-28 9.3 HIGH 8.1 HIGH
Intelbras NPLUG 1.0.0.14 wireless repeater devices have a critical vulnerability that allows an attacker to authenticate in the web interface just by using "admin:" as the name of a cookie.
CVE-2018-12456 1 Intelbras 2 Nplug, Nplug Firmware 2018-11-28 6.8 MEDIUM 8.8 HIGH
Intelbras NPLUG 1.0.0.14 wireless repeater devices have no CSRF token protection in the web interface, allowing attackers to perform actions such as changing the wireless SSID, rebooting the device, editing access control lists, or activating remote access.
CVE-2018-17337 1 Intelbras 2 Nplug, Nplug Firmware 2018-11-28 4.3 MEDIUM 6.1 MEDIUM
Intelbras NPLUG 1.0.0.14 devices have XSS via a crafted SSID that is received via a network broadcast.
CVE-2018-11094 1 Intelbras 2 Ncloud 300, Ncloud 300 Firmware 2018-06-22 10.0 HIGH 9.8 CRITICAL
An issue was discovered on Intelbras NCLOUD 300 1.0 devices. /cgi-bin/ExportSettings.sh, /goform/updateWPS, /goform/RebootSystem, and /goform/vpnBasicSettings do not require authentication. For example, when an HTTP POST request is made to /cgi-bin/ExportSettings.sh, the username, password, and other details are retrieved.
CVE-2017-14219 1 Intelbras 2 Wrn 240, Wrn 240 Firmware 2017-09-19 4.3 MEDIUM 6.1 MEDIUM
XSS (persistent) on the Intelbras Wireless N 150Mbps router with firmware WRN 240 allows attackers to steal wireless credentials without being connected to the network, related to userRpm/popupSiteSurveyRpm.htm and userRpm/WlanSecurityRpm.htm. The attack vector is a crafted ESSID, as demonstrated by an "airbase-ng -e" command.