#Hardware,remote,
-
Hootoo HT-05 - Remote Code Execution (Metasploit)
-
Belkin Wemo UPnP - Remote Code Execution (Metasploit)
-
QNAP TS-431 QTS < 4.2.2 - Remote Command Execution (Metasploit)
-
SAPIDO RB-1732 - Remote Command Execution
-
FaceSentry Access Control System 6.4.8 - Remote SSH Root
-
Siemens TIA Portal - Remote Command Execution
-
Cisco Email Security Appliance (IronPort) C160 - 'Host' Header Injection
-
IntelBras TELEFONE IP TIP200/200 LITE 60.61.75.15 - Arbitrary File Read
-
Inteno IOPSYS Gateway - Improper Access Restrictions
-
Hisilicon HiIpcam V100R003 Remote ADSL - Credentials Disclosure
-
eMerge E3 Access Controller 4.6.07 - Remote Code Execution (Metasploit)
-
Sagemcom F@ST 3890 (50_10_19-T1) Cable Modem - 'Cable Haunt' Remote Code Execution
-
HiSilicon DVR/NVR hi3520d firmware - Remote Backdoor Account
-
Drobo 5N2 4.1.1 - Remote Command Injection
-
Sony IPELA Network Camera 1.82.01 - 'ftpclient.cgi' Remote Stack Buffer Overflow
-
Adtec Digital Multiple Products - Default Hardcoded Credentials Remote Root
-
GoAhead Web Server 5.1.1 - Digest Authentication Capture Replay Nonce Reuse
-
Cisco 7937G - DoS/Privilege Escalation
-
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 - Hard coded Credentials Shell Access
-
KZTech T3500V 4G LTE CPE 2.0.1 - Weak Default WiFi Password Algorithm