Product:

Gs1900\-8hp_firmware

(Zyxel)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 15
Date Id Summary Products Score Patch Annotated
2019-11-14 CVE-2019-15800 An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Due to lack of input validation in the cmd_sys_traceroute_exec(), cmd_sys_arp_clear(), and cmd_sys_ping_exec() functions in the libclicmd.so library contained in the firmware, an attacker could leverage these functions to call system() and execute arbitrary commands on the switches. (Note that these functions are currently not called in this version of the firmware, however an attacker could use other... Gs1900\-10hp_firmware, Gs1900\-16_firmware, Gs1900\-24_firmware, Gs1900\-24e_firmware, Gs1900\-24hp_firmware, Gs1900\-48_firmware, Gs1900\-48hp_firmware, Gs1900\-8_firmware, Gs1900\-8hp_firmware N/A
2019-11-14 CVE-2019-15799 An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. User accounts created through the web interface of the device, when given non-admin level privileges, have the same level of privileged access as administrators when connecting to the device via SSH (while their permissions via the web interface are in fact restricted). This allows normal users to obtain the administrative password by running the tech-support command via the CLI: this contains the encrypted... Gs1900\-10hp_firmware, Gs1900\-16_firmware, Gs1900\-24_firmware, Gs1900\-24e_firmware, Gs1900\-24hp_firmware, Gs1900\-48_firmware, Gs1900\-48hp_firmware, Gs1900\-8_firmware, Gs1900\-8hp_firmware N/A