cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-45439,https://securityvulnerability.io/vulnerability/CVE-2022-45439,Cleartext Storage of WiFi Credentials in Zyxel AX7501-B0 Firmware,"The Zyxel AX7501-B0 firmware prior to version V5.17(ABPC.3)C0 improperly stores WiFi credentials in cleartext within its configuration file. This design flaw allows an unauthenticated attacker to potentially access these credentials, particularly if they are able to exploit another existing vulnerability to retrieve the configuration file. As a result, this opens up the WLAN service to unauthorized access, risking the security of the network.",Zyxel,Ax7501-b0 Firmware,6.5,MEDIUM,0.0006099999882280827,false,,false,false,false,,,false,false,,2023-01-17T00:00:00.000Z,0 CVE-2022-45440,https://securityvulnerability.io/vulnerability/CVE-2022-45440,Improper Symbolic Link Handling in Zyxel Router Firmware,"A vulnerability in the FTP server of the Zyxel AX7501-B0 firmware allows a local authenticated attacker with administrator privileges to access the root file system. This is achieved by creating a symbolic link on external storage devices such as USB drives, which can be exploited after logging into the FTP server of the vulnerable device. This flaw highlights the potential security risks associated with improper symbolic link handling.",Zyxel,Ax7501-b0 Firmware,4.4,MEDIUM,0.0004199999966658652,false,,false,false,false,,,false,false,,2023-01-17T00:00:00.000Z,0