Vulnerabilities (CVE)

Filtered by vendor Netis-systems Subscribe
Filtered by product N3m
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-43892 1 Netis-systems 2 N3m, N3m Firmware 2025-04-04 N/A 9.8 CRITICAL
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the Hostname parameter within the WAN settings. This vulnerability is exploited via a crafted payload.
CVE-2023-45463 1 Netis-systems 2 N3m, N3m Firmware 2024-10-15 N/A 7.5 HIGH
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the hostName parameter in the FUN_0040dabc function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2023-44860 1 Netis-systems 2 N3m, N3m Firmware 2023-11-07 N/A 7.5 HIGH
An issue in NETIS SYSTEMS N3Mv2 v.1.0.1.865 allows a remote attacker to cause a denial of service via the authorization component in the HTTP request.
CVE-2023-45467 1 Netis-systems 2 N3m, N3m Firmware 2023-10-19 N/A 9.8 CRITICAL
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ntpServIP parameter in the Time Settings.
CVE-2023-45464 1 Netis-systems 2 N3m, N3m Firmware 2023-10-19 N/A 7.5 HIGH
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the servDomain parameter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.
CVE-2023-45465 1 Netis-systems 2 N3m, N3m Firmware 2023-10-19 N/A 9.8 CRITICAL
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the ddnsDomainName parameter in the Dynamic DNS settings.
CVE-2023-45466 1 Netis-systems 2 N3m, N3mv2 Firmware 2023-10-16 N/A 9.8 CRITICAL
Netis N3Mv2-V1.0.1.865 was discovered to contain a command injection vulnerability via the pin_host parameter in the WPS Settings.
CVE-2023-45468 1 Netis-systems 2 N3m, N3m Firmware 2023-10-16 N/A 7.5 HIGH
Netis N3Mv2-V1.0.1.865 was discovered to contain a buffer overflow via the pingWdogIp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input.