Vulnerabilities (CVE)

Filtered by vendor Trivum Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-13859 1 Trivum 2 C4 Professional, C4 Professional Firmware 2024-02-04 7.5 HIGH 9.8 CRITICAL
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional before V9.34 build 13381 - 12.07.18, allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).
CVE-2018-13861 1 Trivum 2 Webtouch Setup V9, Webtouch Setup V9 Firmware 2024-02-04 10.0 HIGH 9.8 CRITICAL
Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allows unauthorized remote attackers to reboot or execute other functions via the "/xml/system/control.xml" URL, using the GET request "?action=reboot" for example.
CVE-2018-13858 1 Trivum 2 C4 Professional, C4 Professional Firmware 2024-02-04 10.0 HIGH 9.8 CRITICAL
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional allows unauthorized remote attackers to reboot or execute other functions via the "/xml/system/control.xml" URL, using the GET request "?action=reboot" for example.
CVE-2018-13860 1 Trivum 2 C4 Professional, C4 Professional Firmware 2024-02-04 5.0 MEDIUM 7.5 HIGH
MusicCenter / Trivum Multiroom Setup Tool V8.76 - SNR 8604.26 - C4 Professional before V9.34 build 13381 - 12.07.18 allows unauthorized remote attackers to obtain sensitive information via the "/xml/menu/getObjectEditor.xml" URL, using a "?oid=systemSetup&id=_0" or "?oid=systemUsers&id=_0" GET request.
CVE-2018-13862 1 Trivum 2 Webtouch Setup V9, Webtouch Setup V9 Firmware 2024-02-04 7.5 HIGH 9.8 CRITICAL
Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).