Exploit Platforms

Hardware Exploits

Date D A V Title Platform Author
2015-07-01 - Waiting verification D-Link DSP-W w110 v1.05b01 - Multiple Vulnerabilities hardware DNO
2015-06-30 - Waiting verification Polycom RealPresence Resource Manager < 8.4 - Multiple Vulnerabilities hardware SEC Consult
2015-06-29 - Waiting verification Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Disclosure hardware Fady Mohammed .
2015-06-29 - Waiting verification Huawei Home Gateway UPnP/1.0 IGD/1.00 - Password Change Vulnerability hardware Fady Mohammed .
2015-06-19 - Waiting verification ZTE ZXV10 W300 v3.1.0c_DR0 - UI Session Delete Vulnerability hardware Vulnerability-.
2015-06-16 - Verified Apexis IP CAM - Information Disclosure hardware Sunplace Solut.
2015-06-10 - Waiting verification GeoVision (GeoHttpServer) Webcams Remote File Disclosure Exploit hardware Viktor Minin
2015-06-10 - Waiting verification Alcatel-Lucent OmniSwitch - CSRF Vulnerability hardware RedTeam Pentes.
2015-06-08 - Waiting verification D-Link DSL-2780B DLink_1.01.14 - Unauthenticated Remote DNS Change hardware Todor Donev
2015-06-08 - Waiting verification TP-Link ADSL2+ TD-W8950ND - Unauthenticated Remote DNS Change hardware Todor Donev
2015-06-08 - Waiting verification D-Link DSL-2730B AU_2.01 - Authentication Bypass DNS Change hardware Todor Donev
2015-06-08 - Waiting verification D-Link DSL-526B ADSL2+ AU_2.01 - Unauthenticated Remote DNS Change hardware Todor Donev
2015-06-06 - Waiting verification Broadlight Residential Gateway DI3124 - Unauthenticated Remote DNS Change hardware Todor Donev
2015-06-04 - Waiting verification ZTE AC 3633R USB Modem Multiple Vulnerabilities hardware Vishnu
2015-06-03 - Waiting verification Seagate Central 2014.0410.0026-F Remote Root Exploit hardware Jeremy Brown
2015-06-03 - Waiting verification Seagate Central 2014.0410.0026-F Remote Facebook Access Token Exploit hardware Jeremy Brown
2015-06-01 - Verified Airties login-cgi Buffer Overflow hardware metasploit
2015-06-01 - Verified D-Link Devices HNAP SOAPAction-Header Command Execution hardware metasploit