📦 Rex 100 Firmware
by Helmholz
🔍 What is Rex 100 Firmware?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This critical vulnerability allows unauthenticated remote attackers to execute arbitrary operating system commands on affected devices via UDP packets. It affects network devices with missing authenti...
CVE-2024-45276 allows unauthenticated remote attackers to read files from the /tmp directory due to missing authentication checks. This affects systems running vulnerable versions of the software with...
An unauthenticated local attacker can gain administrative privileges by deploying a malicious configuration file due to improper input validation. This affects systems running vulnerable versions of t...
CVE-2024-45273 allows an unauthenticated local attacker to decrypt device configuration files due to weak encryption implementation, potentially compromising the device. This affects systems using vul...