ISE SOHO Vulnerability Catalog Published - Independent Security ...
ISE SOHO Vulnerability Catalog Published - Independent Security ...
ISE SOHO Vulnerability Catalog Published - Independent Security ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Vulnerability</strong>: Cross-‐Site Scripting ............................................................................................. 68 <br />
<strong>Vulnerability</strong>: Authentication Bypass ....................................................................................... 71 <br />
<strong>Vulnerability</strong>: Authorization Header Failure ......................................................................... 72 <br />
Belkin N300 ............................................................................................................................................... 74 <br />
<strong>Vulnerability</strong>: Cross-‐Site Request Forgery .............................................................................. 74 <br />
<strong>Vulnerability</strong>: Cross-‐Site Scripting ............................................................................................. 76 <br />
<strong>Vulnerability</strong>: Authentication Bypass ....................................................................................... 78 <br />
<strong>Vulnerability</strong>: Authorization Header Failure ......................................................................... 80 <br />
Belkin F5D8236-‐4 v2 ............................................................................................................................. 82 <br />
<strong>Vulnerability</strong>: Cross-‐Site Request Forgery .............................................................................. 82 <br />
<strong>Vulnerability</strong>: Cross-‐Site Scripting ............................................................................................. 84 <br />
<strong>Vulnerability</strong>: Authentication Bypass ....................................................................................... 85 <br />
ASUS RT-‐N56U ......................................................................................................................................... 88 <br />
<strong>Vulnerability</strong>: Cross-‐Site Request Forgery .............................................................................. 88 <br />
<strong>Vulnerability</strong>: Persistent Code Execution (File-‐system Permissions) ......................... 90 <br />
ASUS RT-‐AC66U ....................................................................................................................................... 92 <br />
<strong>Vulnerability</strong>: Cross-‐Site Request Forgery .............................................................................. 92 <br />
<strong>Vulnerability</strong>: Persistent Code Execution (File-‐system Permissions) ......................... 94 <br />
<strong>Vulnerability</strong>: Multiple Buffer Overflow ................................................................................... 95 <br />
TP-‐LINK TL-‐WDR4300 ...................................................................................................................... 100 <br />
<strong>Vulnerability</strong>: Cross-‐Site Request Forgery ........................................................................... 100 <br />
<strong>Vulnerability</strong>: SMB Symlink Traversal ................................................................................... 101 <br />
<br />
3