CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
ZyXEL P-660HW v3 devices allow remote attackers to cause a denial of service (CPU consumption) via a flood of IP packets with a TTL of 1. | 7.5 |
High |
||
Multiple cross-site request forgery (CSRF) vulnerabilities on the ZyXEL P-660HW series router allow remote attackers to (1) change DNS servers and (2) add keywords to the "bannedlist" via unspecified vectors. | 6.8 |
|||
The ZyXEL P-660HW series router maintains authentication state by IP address, which allows remote attackers to bypass authentication by establishing a session from a source IP address of a previously authenticated user. | 10 |
|||
The ZyXEL P-660HW series router has "admin" as its default password, which allows remote attackers to gain administrative access. | 10 |