Critical
CVSS: 10.0
This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying system using the file name of an uploaded file.
Critical
CVSS: 10.0
Remote Code Execution vulnerability that allows unauthenticated attackers to inject arbitrary commands into the hostname of the device.
High
CVSS: 7.5
This vulnerability allows unauthenticated attackers to inject an SQL request into GET request parameters and directly query the underlying database.
High
CVSS: 8.6
This vulnerability allows authenticated attackers to execute commands via the NTP-configuration of the device.
Critical
CVSS: 10.0
This vulnerability allows authenticated attackers to execute commands via the hostname of the device.