The web interface on the Axesstel MV 410R redirects users back to the referring page after execution of some CGI scripts, which makes it easier for remote attackers to avoid detection of cross-site request forgery (CSRF) attacks, as demonstrated by a redirect from the cgi-bin/wireless.cgi script.
Max CVSS
5.8
EPSS Score
0.15%
Published
2009-07-05
Updated
2018-10-10
cgi-bin/sysconf.cgi on the Axesstel MV 410R allows remote attackers to cause a denial of service (configuration reset) via a RESTORE=RESTORE query string.
Max CVSS
7.8
EPSS Score
0.77%
Published
2009-07-05
Updated
2018-10-10
The web interface on the Axesstel MV 410R relies on client-side JavaScript code to validate input, which allows remote attackers to send crafted data, and possibly have unspecified other impact, via a client that does not process JavaScript.
Max CVSS
7.5
EPSS Score
0.48%
Published
2009-07-05
Updated
2018-10-10
The default configuration of the Wi-Fi component on the Axesstel MV 410R does not use encryption, which makes it easier for remote attackers to obtain sensitive information by sniffing the network.
Max CVSS
5.0
EPSS Score
0.18%
Published
2009-07-05
Updated
2018-10-10
The Axesstel MV 410R allows remote attackers to cause a denial of service via a flood of SYN packets, a related issue to CVE-1999-0116.
Max CVSS
7.8
EPSS Score
0.33%
Published
2009-07-05
Updated
2018-10-10
The Axesstel MV 410R has a certain default administrator password, and does not force a password change, which makes it easier for remote attackers to obtain access.
Max CVSS
10.0
EPSS Score
0.76%
Published
2009-07-05
Updated
2018-10-10
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!