KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Device Reboot (Unauthenticated)
from Exploit-DB.com RSS Feed https://ift.tt/38Ym8Fh
via IFTTT
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Device Reboot (Unauthenticated)
from Exploit-DB.com RSS Feed https://ift.tt/38Ym8Fh
via IFTTT
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Factory Reset (Unauthenticated)
from Exploit-DB.com RSS Feed https://ift.tt/3s3KO6X
via IFTTT
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Remote Code Execution
from Exploit-DB.com RSS Feed https://ift.tt/2P8Rd29
via IFTTT
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Hard coded Credentials Shell Access
from Exploit-DB.com RSS Feed https://ift.tt/2NxZBrx
via IFTTT
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Authentication Bypass
from Exploit-DB.com RSS Feed https://ift.tt/3bZIjwB
via IFTTT
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Command Injection (Authenticated)
from Exploit-DB.com RSS Feed https://ift.tt/38V6eM3
via IFTTT
SOYAL 701 Client 9.0.1 – Insecure Permissions
from Exploit-DB.com RSS Feed https://ift.tt/2NzRFpG
via IFTTT
SOYAL 701 Server 9.0.1 – Insecure Permissions
from Exploit-DB.com RSS Feed https://ift.tt/3s17rJ2
via IFTTT
SOYAL Biometric Access Control System 5.0 – ‘Change Admin Password’ CSRF
from Exploit-DB.com RSS Feed https://ift.tt/38W0ph7
via IFTTT
SOYAL Biometric Access Control System 5.0 – Master Code Disclosure
from Exploit-DB.com RSS Feed https://ift.tt/2NxYxE3
via IFTTT