Product:

6gk5208\-0ga00\-2ac2_firmware

(Siemens)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 8
Date Id Summary Products Score Patch Annotated
2023-11-14 CVE-2023-44373 A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router... 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 9.1
2023-11-14 CVE-2023-44319 A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router... 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 4.9
2023-11-14 CVE-2023-44374 A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router... 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 8.8
2023-11-14 CVE-2023-44320 A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1... 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 4.3
2023-11-14 CVE-2023-44321 Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again. 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 6.5
2023-11-14 CVE-2023-44322 A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router... 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 5.9
2023-11-14 CVE-2023-44318 Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file. 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware 4.9
2022-10-11 CVE-2022-31765 Affected devices do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. 6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware, 6gk5408\-4gp00\-2am2_firmware, 6gk5408\-4gq00\-2am2_firmware, 6gk5408\-8gr00\-2am2_firmware, 6gk5408\-8gs00\-2am2_firmware, 6gk5416\-4gr00\-2am2_firmware, 6gk5416\-4gs00\-2am2_firmware, 6gk5524\-8gr00\-2ar2_firmware, 6gk5524\-8gr00\-3ar2_firmware, 6gk5524\-8gr00\-4ar2_firmware, 6gk5524\-8gs00\-2ar2_firmware, 6gk5524\-8gs00\-3ar2_firmware, 6gk5524\-8gs00\-4ar2_firmware, 6gk5526\-8gr00\-2ar2_firmware, 6gk5526\-8gr00\-3ar2_firmware, 6gk5526\-8gr00\-4ar2_firmware, 6gk5526\-8gs00\-2ar2_firmware, 6gk5526\-8gs00\-3ar2_firmware, 6gk5526\-8gs00\-4ar2_firmware, 6gk5528\-0aa00\-2ar2_firmware, 6gk5528\-0aa00\-2hr2_firmware, 6gk5528\-0ar00\-2ar2_firmware, 6gk5528\-0ar00\-2hr2_firmware, 6gk5552\-0aa00\-2ar2_firmware, 6gk5552\-0aa00\-2hr2_firmware, 6gk5552\-0ar00\-2ar2_firmware, 6gk5552\-0ar00\-2hr2_firmware, 6gk5622\-2gs00\-2ac2_firmware, 6gk5632\-2gs00\-2ac2_firmware, 6gk5636\-2gs00\-2ac2_firmware, 6gk5642\-2gs00\-2ac2_firmware, 6gk5646\-2gs00\-2ac2_firmware, 6gk5721\-1fc00\-0aa0_firmware, 6gk5721\-1fc00\-0ab0_firmware, 6gk5722\-1fc00\-0aa0_firmware, 6gk5722\-1fc00\-0ab0_firmware, 6gk5722\-1fc00\-0ac0_firmware, 6gk5734\-1fx00\-0aa0_firmware, 6gk5734\-1fx00\-0aa6_firmware, 6gk5734\-1fx00\-0ab0_firmware, 6gk5734\-1fx00\-0ab6_firmware, 6gk5738\-1gy00\-0aa0_firmware, 6gk5738\-1gy00\-0ab0_firmware, 6gk5748\-1fc00\-0aa0_firmware, 6gk5748\-1fc00\-0ab0_firmware, 6gk5748\-1gd00\-0aa0_firmware, 6gk5748\-1gd00\-0ab0_firmware, 6gk5748\-1gy01\-0aa0_firmware, 6gk5748\-1gy01\-0ta0_firmware, 6gk5761\-1fc00\-0aa0_firmware, 6gk5761\-1fc00\-0ab0_firmware, 6gk5763\-1al00\-3aa0_firmware, 6gk5763\-1al00\-3da0_firmware, 6gk5763\-1al00\-7da0_firmware, 6gk5766\-1ge00\-3da0_firmware, 6gk5766\-1ge00\-3db0_firmware, 6gk5766\-1ge00\-7da0_firmware, 6gk5766\-1ge00\-7db0_firmware, 6gk5766\-1ge00\-7ta0_firmware, 6gk5766\-1ge00\-7tb0_firmware, 6gk5766\-1je00\-3da0_firmware, 6gk5766\-1je00\-7da0_firmware, 6gk5766\-1je00\-7ta0_firmware, 6gk5774\-1fx00\-0aa0_firmware, 6gk5774\-1fx00\-0aa6_firmware, 6gk5774\-1fx00\-0ab0_firmware, 6gk5774\-1fx00\-0ab6_firmware, 6gk5774\-1fx00\-0ac0_firmware, 6gk5774\-1fy00\-0ta0_firmware, 6gk5774\-1fy00\-0tb0_firmware, 6gk5778\-1gy00\-0aa0_firmware, 6gk5778\-1gy00\-0ab0_firmware, 6gk5778\-1gy00\-0ta0_firmware, 6gk5778\-1gy00\-0tb0_firmware, 6gk5786\-1fc00\-0aa0_firmware, 6gk5786\-1fc00\-0ab0_firmware, 6gk5786\-2fc00\-0aa0_firmware, 6gk5786\-2fc00\-0ab0_firmware, 6gk5786\-2fc00\-0ac0_firmware, 6gk5786\-2fe00\-0aa0_firmware, 6gk5786\-2fe00\-0ab0_firmware, 6gk5786\-2hc00\-0aa0_firmware, 6gk5786\-2hc00\-0ab0_firmware, 6gk5788\-1fc00\-0aa0_firmware, 6gk5788\-1fc00\-0ab0_firmware, 6gk5788\-1gd00\-0aa0_firmware, 6gk5788\-1gd00\-0ab0_firmware, 6gk5788\-1gy01\-0aa0_firmware, 6gk5788\-2fc00\-0aa0_firmware, 6gk5788\-2fc00\-0ab0_firmware, 6gk5788\-2fc00\-0ac0_firmware, 6gk5788\-2gd00\-0aa0_firmware, 6gk5788\-2gd00\-0ab0_firmware, 6gk5788\-2gd00\-0ta0_firmware, 6gk5788\-2gd00\-0tb0_firmware, 6gk5788\-2gd00\-0tc0_firmware, 6gk5788\-2gy01\-0aa0_firmware, 6gk5788\-2gy01\-0ta0_firmware, 6gk5788\-2hy01\-0aa0_firmware, 6gk5804\-0ap00\-2aa2_firmware, 6gk5812\-1aa00\-2aa2_firmware, 6gk5812\-1ba00\-2aa2_firmware, 6gk5816\-1aa00\-2aa2_firmware, 6gk5816\-1ba00\-2aa2_firmware, 6gk5826\-2ab00\-2ab2_firmware, 6gk5853\-2ea00\-2da1_firmware, 6gk5856\-2ea00\-3aa1_firmware, 6gk5856\-2ea00\-3da1_firmware, 6gk5874\-2aa00\-2aa2_firmware, 6gk5874\-3aa00\-2aa2_firmware, 6gk5876\-3aa02\-2ba2_firmware, 6gk5876\-3aa02\-2ea2_firmware, 6gk5876\-4aa00\-2ba2_firmware, 6gk5876\-4aa00\-2da2_firmware, 6gk6108\-4am00\-2ba2_firmware, 6gk6108\-4am00\-2da2_firmware 8.8