Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Wireless_1410d_gateway_firmware
(Emerson)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-10-22 | CVE-2021-38485 | The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk. | Wireless_1410_gateway_firmware, Wireless_1410d_gateway_firmware, Wireless_1420_gateway_firmware | 8.8 | ||
2021-10-22 | CVE-2021-42540 | The affected product is vulnerable to a unsanitized extract folder for system configuration. A low-privileged user can leverage this logic to overwrite the settings and other key functionality. | Wireless_1410_gateway_firmware, Wireless_1410d_gateway_firmware, Wireless_1420_gateway_firmware | 8.8 | ||
2021-10-22 | CVE-2021-42542 | The affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure. | Wireless_1410_gateway_firmware, Wireless_1410d_gateway_firmware, Wireless_1420_gateway_firmware | 8.8 | ||
2021-10-22 | CVE-2021-42539 | The affected product is vulnerable to a missing permission validation on system backup restore, which could lead to account take over and unapproved settings change. | Wireless_1410_gateway_firmware, Wireless_1410d_gateway_firmware, Wireless_1420_gateway_firmware | 8.8 | ||
2021-10-22 | CVE-2021-42536 | The affected product is vulnerable to a disclosure of peer username and password by allowing all users access to read global variables. | Wireless_1410_gateway_firmware, Wireless_1410d_gateway_firmware, Wireless_1420_gateway_firmware | 6.5 | ||
2021-10-22 | CVE-2021-42538 | The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input. | Wireless_1410_gateway_firmware, Wireless_1410d_gateway_firmware, Wireless_1420_gateway_firmware | 8.8 |