Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Internet\-Box_plus_firmware
(Swisscom)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-08-04 | CVE-2020-16134 | An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or reset button, an attacker can create a user with elevated privileges on the Sysbus-API. This can then be used to modify local or remote SSH access, thus allowing a login session as the superuser. | Internet\-Box_2_firmware, Internet\-Box_3_firmware, Internet\-Box_light_firmware, Internet\-Box_plus_firmware, Internet\-Box_standard_firmware | 8.0 | ||
2018-12-17 | CVE-2018-16596 | A stack-based buffer overflow in the LAN UPnP service running on UDP port 1900 of Swisscom Internet-Box (2, Standard, and Plus) prior to v09.04.00 and Internet-Box light prior to v08.05.02 allows remote code execution. No authentication is required to exploit this vulnerability. Sending a simple UDP packet to port 1900 allows an attacker to execute code on a remote device. However, this is only possible if the attacker is inside the LAN. Because of ASLR, the success rate is not 100% and... | Internet\-Box_2_firmware, Internet\-Box_light_firmware, Internet\-Box_plus_firmware, Internet\-Box_standard_firmware | 7.5 |