Vulnerabilities (CVE)

Filtered by vendor Swisscom Subscribe
Filtered by product Internet-box Light
Total 2 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-16134 1 Swisscom 10 Internet-box 2, Internet-box 2 Firmware, Internet-box 3 and 7 more 2024-11-21 7.7 HIGH 8.0 HIGH
An issue was discovered on Swisscom Internet Box 2, Internet Box Standard, Internet Box Plus prior to 10.04.38, Internet Box 3 prior to 11.01.20, and Internet Box light prior to 08.06.06. Given the (user-configurable) credentials for the local Web interface or physical access to a device's plus or reset button, an attacker can create a user with elevated privileges on the Sysbus-API. This can then be used to modify local or remote SSH access, thus allowing a login session as the superuser.
CVE-2018-16596 1 Swisscom 8 Internet-box 2, Internet-box 2 Firmware, Internet-box Light and 5 more 2024-11-21 5.4 MEDIUM 7.5 HIGH
A stack-based buffer overflow in the LAN UPnP service running on UDP port 1900 of Swisscom Internet-Box (2, Standard, and Plus) prior to v09.04.00 and Internet-Box light prior to v08.05.02 allows remote code execution. No authentication is required to exploit this vulnerability. Sending a simple UDP packet to port 1900 allows an attacker to execute code on a remote device. However, this is only possible if the attacker is inside the LAN. Because of ASLR, the success rate is not 100% and leads instead to a DoS of the UPnP service. The remaining functionality of the Internet Box is not affected. A reboot of the Internet Box is necessary to attempt the exploit again.