Vulnerabilities (CVE)

Filtered by vendor Fastweb Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30114 1 Fastweb 4 Fastgate Gpon Fga2130fwb, Fastgate Gpon Fga2130fwb Firmware, Fastgate Vdsl2 Dga4131fwb and 1 more 2024-11-21 N/A 7.5 HIGH
A heap-based buffer overflow in a network service in Fastweb FASTGate MediaAccess FGA2130FWB, firmware version 18.3.n.0482_FW_230_FGA2130, and DGA4131FWB, firmware version up to 18.3.n.0462_FW_261_DGA4131, allows a remote attacker to reboot the device through a crafted HTTP request, causing DoS.
CVE-2020-13620 1 Fastweb 2 Fastgate Gpon Fga2130fwb, Fastgate Gpon Fga2130fwb Firmware 2024-11-21 6.8 MEDIUM 8.8 HIGH
Fastweb FASTGate GPON FGA2130FWB devices through 2020-05-26 allow CSRF via the router administration web panel, leading to an attacker's ability to perform administrative actions such as modifying the configuration.
CVE-2019-18661 1 Fastweb 2 Fastgate, Fastgate Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
Fastweb FASTGate 1.0.1b devices allow partial authentication bypass by changing a certain check_pwd return value from 0 to 1. An attack does not achieve administrative control of a device; however, the attacker can view all of the web pages of the administration console.
CVE-2019-12489 1 Fastweb 2 Askey Rtv1907vw, Askey Rtv1907vw Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
An issue was discovered on Fastweb Askey RTV1907VW 0.00.81_FW_200_Askey 2018-10-02 18:08:18 devices. By using the usb_remove service through an HTTP request, it is possible to inject and execute a command between two & characters in the mount parameter.
CVE-2018-6023 1 Fastweb 2 Fastgate, Fastgate Firmware 2024-11-21 6.8 MEDIUM 8.8 HIGH
Fastweb FASTgate 0.00.47 devices are vulnerable to CSRF, with impacts including Wi-Fi password changing, Guest Wi-Fi activating, etc.
CVE-2018-20122 1 Fastweb 2 Fastgate, Fastgate Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
The web interface on FASTGate Fastweb devices with firmware through 0.00.47_FW_200_Askey 2017-05-17 (software through 1.0.1b) exposed a CGI binary that is vulnerable to a command injection vulnerability that can be exploited to achieve remote code execution with root privileges. No authentication is required in order to trigger the vulnerability.