Motorola Security Vulnerabilities (CVEs)
Track 20 security vulnerabilities affecting Motorola products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.
This vulnerability allows attackers to bypass authentication by modifying bootloader arguments, gaining access to the file system and password hashes....
Jun 13, 2024This vulnerability allows attackers to access the maintenance console of affected devices using hard-coded credentials for a hidden wireless network. ...
Jun 13, 2024This vulnerability allows authenticated attackers to upload arbitrary firmware to Motorola MR2600 routers, leading to remote code execution. Attackers...
Jan 26, 2024A command injection vulnerability in the Motorola MR2600 router's 'SaveStaticRouteIPv6Params' parameter allows authenticated remote attackers to execu...
Jan 26, 2024A command injection vulnerability in the Motorola MR2600 router's SaveSysLogParams parameter allows authenticated remote attackers to execute arbitrar...
Jan 26, 2024A format string vulnerability in Motorola MTM5000 series firmware allows attackers to execute arbitrary code with root privileges by sending specially...
Oct 19, 2023Motorola MTM5000 series TETRA radios use weak random number generation for authentication challenges, allowing attackers to predict or brute-force aut...
Oct 19, 2023This vulnerability allows authenticated attackers to upload malicious firmware to Motorola MBTS Site Controllers due to missing cryptographic signatur...
Aug 29, 2023Motorola EBTS/MBTS Site Controller devices expose a debug prompt on the serial port when encountering unhandled exceptions. This allows attackers with...
Aug 29, 2023Motorola MBTS Site Controller contains a hard-coded backdoor password in its Man Machine Interface (MMI) that cannot be changed or disabled. This allo...
Aug 29, 2023Motorola CX2L Router version 1.0.1 contains a command injection vulnerability in the staticroute_list parameter that allows attackers to execute arbit...
May 11, 2023Motorola CX2L Router version 1.0.1 contains a command injection vulnerability in the smartqos_priority_devices parameter that allows attackers to exec...
May 11, 2023Motorola ACE1000 RTUs lack firmware signing for application images, relying only on insecure checksums. This allows attackers to upload malicious appl...
Jul 26, 2022The Motorola ACE1000 RTU has five preconfigured accounts with default credentials, including two undocumented accounts. This allows attackers to gain ...
Jul 26, 2022CVE-2022-30272 allows attackers to upload malicious firmware to Motorola ACE1000 RTUs due to lack of cryptographic authentication. This affects organi...
Jul 26, 2022CVE-2022-30274 is a critical vulnerability in Motorola ACE1000 RTU devices where credentials and authentication data are encrypted using the Tiny Encr...
Jul 26, 2022Motorola CX2 router firmware versions including Build 20190508 Rel.97360n store admin passwords and private keys in log files that are included in tar...
Jul 21, 2021This CVE describes a command injection vulnerability in the HNAP1/GetNetworkTomographySettings endpoint of Motorola CX2 routers. Attackers can exploit...
Jul 21, 2021This CVE describes a command injection vulnerability in the HNAP1/SetWLanApcliSettings endpoint of Motorola CX2 routers. Attackers can execute arbitra...
Jul 21, 2021Motorola MH702x devices before version 2.0.0.301 fail to properly validate SSL/TLS server certificates when communicating with the support server. Thi...
Apr 13, 2021Why Monitor Motorola Security Vulnerabilities?
Real-time CVE tracking: Our automated system monitors 20+ known vulnerabilities affecting Motorola products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.
Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Motorola packages in under 60 seconds. No agents required - completely agentless scanning that works across Motorola deployments.
Free vulnerability database: Access detailed information about every Motorola CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.
🚀 Get Started in 60 Seconds
- Register free account & add your servers
- Run one-time scan or schedule automatic monitoring (every 1-24 hours)
- Receive instant alerts when new Motorola CVEs affect your systems
- Access dashboard with severity breakdown & fix instructions