cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2018-0647,https://securityvulnerability.io/vulnerability/CVE-2018-0647,,Cross-site request forgery (CSRF) vulnerability in WL-330NUL Firmware version prior to 3.0.0.46 allows remote attackers to hijack the authentication of administrators via unspecified vectors.,Asus Japan Inc.,Wl-330nul,8.8,HIGH,0.0013299999991431832,false,false,false,false,,false,false,2018-09-07T14:00:00.000Z,0 CVE-2015-7788,https://securityvulnerability.io/vulnerability/CVE-2015-7788,,ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to execute arbitrary commands via unspecified vectors.,Asus,Wl-330nul Firmware,7.3,HIGH,0.0040699997916817665,false,false,false,false,,false,false,2015-12-30T02:00:00.000Z,0 CVE-2015-7787,https://securityvulnerability.io/vulnerability/CVE-2015-7787,,ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to discover the WPA2-PSK passphrase via unspecified vectors.,Asus,Wl-330nul Firmware,4.3,MEDIUM,0.002460000105202198,false,false,false,false,,false,false,2015-12-30T02:00:00.000Z,0 CVE-2015-7790,https://securityvulnerability.io/vulnerability/CVE-2015-7790,,Cross-site scripting (XSS) vulnerability on ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.,Asus,Wl-330nul Firmware,6.1,MEDIUM,0.001820000004954636,false,false,false,false,,false,false,2015-12-30T02:00:00.000Z,0 CVE-2015-7789,https://securityvulnerability.io/vulnerability/CVE-2015-7789,,ASUS Japan WL-330NUL devices with firmware before 3.0.0.42 allow remote attackers to cause a denial of service via unspecified vectors.,Asus,"Wl-33nul Firmware,Wl-330nul",4.3,MEDIUM,0.002959999954327941,false,false,false,false,,false,false,2015-12-30T02:00:00.000Z,0 CVE-2013-7293,https://securityvulnerability.io/vulnerability/CVE-2013-7293,,"The ASUS WL-330NUL router has a configuration process that relies on accessing the 192.168.1.1 IP address, but the documentation advises users to instead access a DNS hostname that does not always resolve to 192.168.1.1, which makes it easier for remote attackers to hijack the configuration traffic by controlling the server associated with that hostname.",Asus,Wl-330nul,,,0.0013699999544769526,false,false,false,false,,false,false,2014-01-15T02:00:00.000Z,0