Product:

Internet\-Box_standard_firmware

(Swisscom)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2020-08-04 CVE-2020-16134 An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or reset button, an attacker can create a user with elevated privileges on the Sysbus-API. This can then be used to modify local or remote SSH access, thus allowing a login session as the superuser. Internet\-Box_2_firmware, Internet\-Box_3_firmware, Internet\-Box_light_firmware, Internet\-Box_plus_firmware, Internet\-Box_standard_firmware 8.0
2018-12-17 CVE-2018-16596 A stack-based buffer overflow in the LAN UPnP service running on UDP port 1900 of Swisscom Internet-Box (2, Standard, and Plus) prior to v09.04.00 and Internet-Box light prior to v08.05.02 allows remote code execution. No authentication is required to exploit this vulnerability. Sending a simple UDP packet to port 1900 allows an attacker to execute code on a remote device. However, this is only possible if the attacker is inside the LAN. Because of ASLR, the success rate is not 100% and... Internet\-Box_2_firmware, Internet\-Box_light_firmware, Internet\-Box_plus_firmware, Internet\-Box_standard_firmware 7.5