cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2008-1526,https://securityvulnerability.io/vulnerability/CVE-2008-1526,,"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), do not use a salt when calculating an MD5 password hash, which makes it easier for attackers to crack passwords.",Zyxel,"Zynos,Prestige 661,Prestige 660",7.5,HIGH,0.001979999942705035,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1521,https://securityvulnerability.io/vulnerability/CVE-2008-1521,,"ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to gain privileges by accessing administrative URIs, as demonstrated by rpSysAdmin.html.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.003060000017285347,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1529,https://securityvulnerability.io/vulnerability/CVE-2008-1529,,"ZyXEL Prestige routers have a minimum password length for the admin account that is too small, which makes it easier for remote attackers to guess passwords via brute force methods.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.0049600000493228436,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1528,https://securityvulnerability.io/vulnerability/CVE-2008-1528,,"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain authentication data by making direct HTTP requests and then reading the HTML source, as demonstrated by a request for (1) RemMagSNMP.html, which discloses SNMP communities; or (2) WLAN.html, which discloses WEP keys.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.0020600000862032175,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1527,https://securityvulnerability.io/vulnerability/CVE-2008-1527,,"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.004550000187009573,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1525,https://securityvulnerability.io/vulnerability/CVE-2008-1525,,"The default SNMP configuration on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has a Trusted Host value of 0.0.0.0, which allows remote attackers to send SNMP requests from any source IP address.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.005350000225007534,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1524,https://securityvulnerability.io/vulnerability/CVE-2008-1524,,"The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has ""public"" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.008209999650716782,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1523,https://securityvulnerability.io/vulnerability/CVE-2008-1523,,"ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), allow remote authenticated users to obtain ISP and Dynamic DNS credentials by sending a direct request for (1) WAN.html, (2) wzPPPOE.html, and (3) rpDyDNS.html, and then reading the HTML source.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.0049600000493228436,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2008-1522,https://securityvulnerability.io/vulnerability/CVE-2008-1522,,"ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), have (1) ""user"" as their default password for the ""user"" account and (2) ""1234"" as their default password for the ""admin"" account, which makes it easier for remote attackers to obtain access.",Zyxel,"Zynos,Prestige 661,Prestige 660",,,0.01095999963581562,false,,false,false,false,,,false,false,,2008-03-26T10:00:00.000Z,0 CVE-2006-3929,https://securityvulnerability.io/vulnerability/CVE-2006-3929,,Cross-site scripting (XSS) vulnerability in the Forms/rpSysAdmin script on the Zyxel Prestige 660H-61 ADSL Router running firmware 3.40(PT.0)b32 allows remote attackers to inject arbitrary web script or HTML via hex-encoded values in the a parameter.,Zyxel,Prestige 660h-61,,,0.01996999979019165,false,,false,false,false,,,false,false,,2006-07-31T21:00:00.000Z,0 CVE-2005-3724,https://securityvulnerability.io/vulnerability/CVE-2005-3724,,"Zyxel P2000W Version 1 VOIP WIFI Phone Wj.00.10 allows remote attackers to obtain sensitive information and possibly cause a denial of service via a direct connection to UDP port 9090, which is undocumented and does not require authentication.",Zyxel,"Prestige 2000w V.1voip Wi-fi Phone,P2000w Version 1 Voip Wifi Phone",,,0.012590000405907631,false,,false,false,false,,,false,false,,2005-11-21T11:00:00.000Z,0 CVE-2005-3725,https://securityvulnerability.io/vulnerability/CVE-2005-3725,,"Zyxel P2000W Version 1 VOIP WIFI Phone Wj.00.10 uses hardcoded IP addresses for its DNS servers, which could allow remote attackers to cause a denial of service or hijack Zyxel phones by attacking or spoofing the hardcoded DNS servers. NOTE: it could be argued that this issue reflects an inherent limitation of DNS itself, so perhaps it should not be included in CVE.",Zyxel,Prestige 2000w V.1voip Wi-fi Phone,,,0.0037899999879300594,false,,false,false,false,,,false,false,,2005-11-21T11:00:00.000Z,0 CVE-2005-1717,https://securityvulnerability.io/vulnerability/CVE-2005-1717,,ZyXEL Prestige 650R-31 router running ZyNOS FW v3.40(KO.1) allows remote attackers to cause a denial of service (CPU consumption and network loss) via crafted fragmented IP packets.,Zyxel,Prestige 650r-31,,,0.016979999840259552,false,,false,false,false,,,false,false,,2005-05-24T04:00:00.000Z,0 CVE-2005-0328,https://securityvulnerability.io/vulnerability/CVE-2005-0328,,"Zyxel P310, P314, P324 and Netgear RT311, RT314 running the latest firmware, allows remote attackers on the WAN to obtain the IP address of the LAN side interface by pinging a valid LAN IP address, which generates an ARP reply from the WAN address side that maps the LAN IP address to the WAN's MAC address.",Zyxel,"Prestige,Rt314,Rt311",,,0.005179999861866236,false,,false,false,false,,,false,false,,2005-05-02T04:00:00.000Z,0 CVE-2004-1540,https://securityvulnerability.io/vulnerability/CVE-2004-1540,,"ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.",Zyxel,"Prestige,Zynos",,,0.04396999999880791,false,,false,false,false,,,false,false,,2004-12-31T05:00:00.000Z,0 CVE-2004-1684,https://securityvulnerability.io/vulnerability/CVE-2004-1684,,"Zyxel P681 running ZyNOS Vt020225a contains portions of memory in an ARP request, which allows remote attackers to obtain sensitive information by sniffing the network.",Zyxel,"Prestige,Zynos",,,0.005570000037550926,false,,false,false,false,,,false,false,,2004-09-13T04:00:00.000Z,0 CVE-2004-0670,https://securityvulnerability.io/vulnerability/CVE-2004-0670,,Prestige 650HW-31 running Rompager 4.7 software allows remote attackers to cause a denial of service (device reboot) via a long password.,Zyxel,Prestige,,,0.010379999876022339,false,,false,false,false,,,false,false,,2004-08-06T04:00:00.000Z,0 CVE-2002-1072,https://securityvulnerability.io/vulnerability/CVE-2002-1072,,"ZyXEL Prestige 642R 2.50(FA.1) and Prestige 310 V3.25(M.01), allows remote attackers to cause a denial of service via an oversized, fragmented ""jolt"" style ICMP packet.",Zyxel,Prestige,,,0.027060000225901604,false,,false,false,false,,,false,false,,2002-10-04T04:00:00.000Z,0 CVE-2002-1071,https://securityvulnerability.io/vulnerability/CVE-2002-1071,,"ZyXEL Prestige 642R allows remote attackers to cause a denial of service in the Telnet, FTP, and DHCP services (crash) via a TCP packet with both the SYN and ACK flags set.",Zyxel,Prestige,,,0.01319000031799078,false,,false,false,false,,,false,false,,2002-10-04T04:00:00.000Z,0 CVE-2001-1194,https://securityvulnerability.io/vulnerability/CVE-2001-1194,,"Zyxel Prestige 681 and 1600 SDSL Routers allow remote attackers to cause a denial of service via malformed packets with (1) an IP length less than actual packet size, or (2) fragmented packets whose size exceeds 64 kilobytes after reassembly.",Zyxel,"Prestige 681,Prestige 1600",,,0.014279999770224094,false,,false,false,false,,,false,false,,2001-12-14T05:00:00.000Z,0 CVE-2001-1135,https://securityvulnerability.io/vulnerability/CVE-2001-1135,,"ZyXEL Prestige 642R and 642R-I routers do not filter the routers' Telnet and FTP ports on the external WAN interface from inside access, allowing someone on an internal computer to reconfigure the router, if the password is known.",Zyxel,Prestige,,,0.0031999999191612005,false,,false,false,false,,,false,false,,2001-08-14T04:00:00.000Z,0