📦 Vap11g 300 Firmware

by Vonets

🔍 What is Vap11g 300 Firmware?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2024-39791

CRITICAL CVSS 10.0 Aug 12, 2024

CVE-2024-39791 is a critical stack-based buffer overflow vulnerability in Vonets industrial WiFi bridge devices that allows unauthenticated remote attackers to execute arbitrary code. This affects Von...

CVE-2024-37023

CRITICAL CVSS 9.1 Aug 12, 2024

This vulnerability allows authenticated remote attackers to execute arbitrary operating system commands on Vonets industrial WiFi bridge devices. Attackers can inject malicious commands through variou...

CVE-2024-46328

HIGH CVSS 8.0 Sep 26, 2024

VONETS VAP11G-300 devices contain hardcoded credentials for privileged accounts including root, allowing attackers to gain administrative access. This affects all users of VAP11G-300 devices running v...

CVE-2024-46330

HIGH CVSS 7.4 Sep 26, 2024

This CVE describes a command injection vulnerability in VONETS VAP11G-300 devices that allows attackers to execute arbitrary commands on the system. The vulnerability exists in the iptablesWebsFilterR...

CVE-2024-41936

HIGH CVSS 7.5 Aug 12, 2024

An unauthenticated directory traversal vulnerability in Vonets industrial wifi bridge devices allows remote attackers to read arbitrary files and bypass authentication. This affects Vonets industrial ...

CVE-2024-29082

HIGH CVSS 8.6 Aug 12, 2024

An unauthenticated remote attacker can bypass authentication and factory reset Vonets industrial wifi bridge devices via unprotected goform endpoints. This affects Vonets industrial wifi bridge relays...

CVE-2024-41161

HIGH CVSS 7.5 Aug 8, 2024

CVE-2024-41161 is a critical authentication bypass vulnerability in Vonets industrial wifi bridge devices. Unauthenticated remote attackers can gain administrative access using hard-coded credentials ...

CVE-2024-46327

MEDIUM CVSS 5.7 Sep 26, 2024

This directory traversal vulnerability in VONETS VAP11G-300 routers allows attackers to access sensitive files by manipulating HTTP requests. Attackers can potentially read system files, configuration...