Greenpacket : Security Vulnerabilities, CVEs,
GreenPacket OH736's WR-1200 Indoor Unit, OT-235 with firmware versions M-IDU-1.6.0.3_V1.1 and MH-46360-2.0.3-R5-GP respectively are vulnerable to remote command injection. Commands are executed using pre-login execution and executed with root privileges allowing complete takeover.
Max CVSS
9.8
EPSS Score
0.37%
Published
2023-04-04
Updated
2023-04-11
Green Packet WiMax DV-360 2.10.14-g1.0.6.1 devices allow Command Injection, with unauthenticated remote command execution, via a crafted payload to the HTTPS port, because lighttpd listens on all network interfaces (including the external Internet) by default. NOTE: this may overlap CVE-2017-9980.
Max CVSS
10.0
EPSS Score
0.36%
Published
2020-12-31
Updated
2021-01-06
In Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, the "PING" (aka tag_ipPing) feature within the web interface allows performing command injection, via the "pip" parameter.
Max CVSS
9.8
EPSS Score
5.00%
Published
2017-07-21
Updated
2017-07-24
Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb has a default password of admin for the admin account.
Max CVSS
9.8
EPSS Score
0.66%
Published
2017-07-21
Updated
2017-07-25
Cross-Site Scripting (XSS) exists in Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by the action parameter to ajax.cgi.
Max CVSS
6.1
EPSS Score
0.09%
Published
2017-07-21
Updated
2017-07-24
Cross-Site Request Forgery (CSRF) exists in Green Packet DX-350 Firmware version v2.8.9.5-g1.4.8-atheeb, as demonstrated by a request to ajax.cgi that enables UPnP.
Max CVSS
8.8
EPSS Score
0.11%
Published
2017-07-21
Updated
2017-07-25
WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request.
Max CVSS
10.0
EPSS Score
0.75%
Published
2017-06-20
Updated
2019-10-09
Green Packet DX-350 uses non-random default credentials of: root:wimax. A remote network attacker can gain privileged access to a vulnerable device.
Max CVSS
10.0
EPSS Score
0.21%
Published
2018-07-13
Updated
2019-10-09
8 vulnerabilities found