Vulnerabilities (CVE)

Filtered by vendor Intelbras Subscribe
Filtered by product Iwr 3000n Firmware
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-19007 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 9.0 HIGH 7.2 HIGH
Intelbras IWR 3000N 1.8.7 devices allow disclosure of the administrator login name and password because v1/system/user is mishandled, a related issue to CVE-2019-17600.
CVE-2019-20004 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 4.3 MEDIUM 8.8 HIGH
An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.
CVE-2019-19996 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 7.8 HIGH 7.5 HIGH
An issue was discovered on Intelbras IWR 3000N 1.8.7 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login.
CVE-2019-19995 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 9.3 HIGH 8.8 HIGH
A CSRF issue was discovered on Intelbras IWR 3000N 1.8.7 devices, leading to complete control of the router, as demonstrated by v1/system/user.
CVE-2019-11416 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 9.3 HIGH 8.8 HIGH
A CSRF issue was discovered on Intelbras IWR 3000N 1.5.0 devices, leading to complete control of the router, as demonstrated by v1/system/user.
CVE-2019-11415 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 7.8 HIGH 7.5 HIGH
An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. A malformed login request allows remote attackers to cause a denial of service (reboot), as demonstrated by JSON misparsing of the \""} string to v1/system/login.
CVE-2019-11414 1 Intelbras 2 Iwr 3000n, Iwr 3000n Firmware 2024-02-04 4.3 MEDIUM 8.8 HIGH
An issue was discovered on Intelbras IWR 3000N 1.5.0 devices. When the administrator password is changed from a certain client IP address, administrative authorization remains available to any client at that IP address, leading to complete control of the router.