header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

OptiLink ONT1GEW GPON 2.1.11_X101 Build 1127.190306 – Remote Code Execution (Authenticated)

A vulnerability in OptiLink ONT1GEW GPON 2.1.11_X101 Build 1127.190306 allows an authenticated attacker to execute arbitrary code on the device. This exploit was tested on the following configuration: Device Name: ONT1GEW, Software Version: V2.1.11_X101, Build Information: Build.1127.190306. Chances are that XPONs of C-DATA company are affected too. Our research indicated that Optilink devices are just a rebranded version of C-Data.

Monstra CMS 3.0.4 – Remote Code Execution (Authenticated)

Monstra CMS through 3.0.4 has an incomplete "forbidden types" list that excludes .php (and similar) file extensions but not the .pht or .phar extension, which allows remote authenticated Admins or Editors to execute arbitrary PHP code by uploading a file, a different vulnerability than CVE-2017-18048.

CHIYU IoT Devices – Denial of Service (DoS)

A denial of service condition exists after an integer overflow in several IoT devices from CHIYU Technology, including BIOSENSE, Webpass, and BF-630, BF-631, and SEMAC. The vulnerability can be explored by sending an unexpected integer (> 32 bits) on the page parameter that will crash the web portal and making it unavailable until a reboot of the device.

CHIYU IoT Devices – ‘Telnet’ Authentication Bypass

Several IoT devices from the CHIYU Technology firm are vulnerable to a flaw that permits bypassing the telnet authentication process due to an overflow during the negotiation of the telnet protocol. Telnet authentication is bypassed by supplying a specially malformed request, and an attacker may force the remote telnet server to believe that the user has already authenticated. Several models are vulnerable, including BF-430, BF-431, BF-450M, and SEMAC with the most recent firmware versions.

Recent Exploits: