Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Sma_100_firmware
(Sonicwall)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-05-07 | CVE-2025-32819 | A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges to bypass the path traversal checks and delete an arbitrary file potentially resulting in a reboot to factory default settings. | Sma_100_firmware, Sma_200_firmware, Sma_210_firmware, Sma_400_firmware, Sma_410_firmware, Sma_500v_firmware | 8.8 | ||
2025-05-07 | CVE-2025-32821 | A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN admin privileges can with admin privileges can inject shell command arguments to upload a file on the appliance. | Sma_100_firmware, Sma_200_firmware, Sma_210_firmware, Sma_400_firmware, Sma_410_firmware, Sma_500v_firmware | 7.2 | ||
2025-05-07 | CVE-2025-32820 | A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. | Sma_100_firmware, Sma_200_firmware, Sma_210_firmware, Sma_400_firmware, Sma_410_firmware, Sma_500v_firmware | 8.8 |