cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-22921,https://securityvulnerability.io/vulnerability/CVE-2023-22921,XSS Vulnerability in Zyxel NBG-418N v2 Router Firmware,"A cross-site scripting (XSS) vulnerability exists in the Zyxel NBG-418N v2 router, particularly in firmware versions prior to V1.00(AARP.14)C0. This flaw enables a remote authenticated attacker with administrator privileges to inject malicious scripts through the web management interface. If exploited, it can lead to denial-of-service (DoS) conditions, compromising the device's availability and security. It is crucial for users to update to the latest firmware to mitigate risks associated with this vulnerability.",Zyxel,Nbg-418n V2 Firmware,7.5,HIGH,0.001019999966956675,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2023-22922,https://securityvulnerability.io/vulnerability/CVE-2023-22922,Buffer Overflow Vulnerability in Zyxel NBG-418N v2 Router,"The Zyxel NBG-418N v2 is susceptible to a buffer overflow vulnerability affecting firmware versions prior to V1.00(AARP.14)C0. When telnet is enabled, an unauthenticated remote attacker can send specially crafted packets to the device, potentially leading to denial of service (DoS) conditions. This risk emphasizes the importance of keeping firmware updated and disabling unnecessary services like telnet to mitigate exposure.",Zyxel,Nbg-418n V2 Firmware,7.5,HIGH,0.001610000035725534,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2023-22923,https://securityvulnerability.io/vulnerability/CVE-2023-22923,Format String Vulnerability in Zyxel NBG-418N v2 Firmware,"A format string vulnerability exists in specific firmware versions of the Zyxel NBG-418N v2 router, which allows a remote authenticated attacker to exploit the flaw. This exploitation can lead to denial-of-service conditions, adversely affecting network services provided by the device. It is critical for users of affected firmware versions to apply available patches and updates to safeguard their network infrastructure.",Zyxel,Nbg-418n V2 Firmware,6.5,MEDIUM,0.0012799999676644802,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2023-22924,https://securityvulnerability.io/vulnerability/CVE-2023-22924,Buffer Overflow Vulnerability in Zyxel NBG-418N v2 Firmware,"A buffer overflow vulnerability has been identified in the Zyxel NBG-418N v2 firmware, specifically affecting versions prior to V1.00(AARP.14)C0. This issue allows a remote authenticated attacker, possessing administrative privileges, to execute specially crafted CLI commands. By exploiting this vulnerability, the attacker can induce denial-of-service (DoS) conditions, disrupting the normal operation of the device. It is essential for users and administrators to update their firmware version to mitigate this risk.",Zyxel,Nbg-418n V2 Firmware,4.9,MEDIUM,0.001230000052601099,false,,false,false,false,,,false,false,,2023-05-01T00:00:00.000Z,0 CVE-2022-45441,https://securityvulnerability.io/vulnerability/CVE-2022-45441,Cross-Site Scripting Vulnerability in Zyxel NBG-418N v2 Firmware,"A cross-site scripting vulnerability exists in Zyxel NBG-418N v2 firmware, allowing attackers to store malicious scripts in the device's Logs page within the graphical user interface. An authenticated user who visits this page may inadvertently execute the stored scripts, potentially leading to a denial-of-service condition. This vulnerability poses risks to the integrity and availability of the device.",Zyxel,Nbg-418n V2 Firmware,6.1,MEDIUM,0.0007200000109151006,false,,false,false,false,,,false,false,,2023-02-07T00:00:00.000Z,0 CVE-2019-17354,https://securityvulnerability.io/vulnerability/CVE-2019-17354,,"wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.",Zyxel,Nbg-418n V2 Firmware,9.4,CRITICAL,0.0010499999625608325,false,,false,false,false,,,false,false,,2019-10-09T11:57:13.000Z,0