Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:h:asus:wl-330nul:-:*:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2018-0647 |
Cross-site request forgery (CSRF) vulnerability in WL-330NUL Firmware version prior to 3.0.0.46 allows remote attackers to hijack the authentication of administrators via unspecified vectors. Published: September 07, 2018; 10:29:01 AM -0400 |
V3.0: 8.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2015-7790 |
Cross-site scripting (XSS) vulnerability on ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Published: December 30, 2015; 12:59:10 AM -0500 |
V3.0: 6.1 MEDIUM V2.0: 4.3 MEDIUM |
CVE-2015-7789 |
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to cause a denial of service via unspecified vectors. Published: December 30, 2015; 12:59:10 AM -0500 |
V3.0: 4.3 MEDIUM V2.0: 3.3 LOW |
CVE-2015-7788 |
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to execute arbitrary commands via unspecified vectors. Published: December 30, 2015; 12:59:09 AM -0500 |
V3.0: 7.3 HIGH V2.0: 5.8 MEDIUM |
CVE-2015-7787 |
ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to discover the WPA2-PSK passphrase via unspecified vectors. Published: December 30, 2015; 12:59:07 AM -0500 |
V3.0: 4.3 MEDIUM V2.0: 3.3 LOW |
CVE-2013-7293 |
The ASUS WL-330NUL router has a configuration process that relies on accessing the 192.168.1.1 IP address, but the documentation advises users to instead access a DNS hostname that does not always resolve to 192.168.1.1, which makes it easier for remote attackers to hijack the configuration traffic by controlling the server associated with that hostname. Published: January 15, 2014; 11:13:03 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |