CVE-2022-26047 Input validation for Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi may be improperly performed, allowing unauthenticated user to enable denial of service.
Update firmware to resolve this issue. Intel(R) PROSet/Wireless WiFi, Intel vPro(R) CSME WiFi and Killer(TM) WiFi products may accept unauthenticated password
CVE-2022-26341 Incompentent credentials in Intel AMT SDK, EMA, and MC may allow user to escalate privileges via network.
CVE-2018-3620 is the most severe variant of this issue. An attacker with a low skill level would be able to exploit it. It may be
CVE-2022-43105 Tenda AC23 V16.03.07.45_cn was found to have a stack overflow vulnerability in the fromSetWifiGusetBasic function.
It was discovered that the Tenda AC23 V16.03.07.45_cn had multiple cross-site scripting vulnerabilities, which could be exploited by hackers to exploit
CVE-2022-31898 Ingestion of system commands in the ping_addr and trace_addr parameters of the Mango and Flint IoT devices.
An attacker can inject malicious code into the ping_addr or trace_addr parameters to execute commands on the device. Successful exploitation of these issues
CVE-2020-9285 The Sonos One 2nd generation devices can be compromised by attackers controlling the memory via the Mini-PCI Express slot.
This could allow an attacker to inject malicious code into the Sonos One’s software controlled by the attacker controlled WiFi card. It is important
Episode
00:00:00
00:00:00