Search Results (6 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-67015 1 Comtech 4 Cdm-625, Cdm-625 Firmware, Cdm-625a and 1 more 2026-01-02 7.5 High
Incorrect access control in Comtech EF Data CDM-625 / CDM-625A Advanced Satellite Modem with firmware v2.5.1 allows attackers to change the Administrator password and escalate privileges via sending a crafted POST request to /Forms/admin_access_1.
CVE-2019-17667 1 Comtech 2 H8 Heights Remote Gateway, H8 Heights Remote Gateway Firmware 2026-01-02 5.4 Medium
Comtech H8 Heights Remote Gateway 2.5.1 devices allow XSS and HTML injection via the Site Name (aka SiteName) field.
CVE-2020-7242 1 Comtech 2 Stampede Fx-1010, Stampede Fx-1010 Firmware 2026-01-02 7.2 High
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote code execution by navigating to the Diagnostics Trace Route page and entering shell metacharacters in the Target IP address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)
CVE-2020-7244 1 Comtech 2 Stampede Fx-1010, Stampede Fx-1010 Firmware 2026-01-02 7.2 High
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote code execution by navigating to the Poll Routes page and entering shell metacharacters in the Router IP Address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)
CVE-2020-7243 1 Comtech 2 Stampede Fx-1010, Stampede Fx-1010 Firmware 2026-01-02 7.2 High
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to achieve remote code execution by navigating to the Fetch URL page and entering shell metacharacters in the URL field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)
CVE-2020-5179 1 Comtech 2 Stampede Fx-1010, Stampede Fx-1010 Firmware 2026-01-02 7.2 High
Comtech Stampede FX-1010 7.4.3 devices allow remote authenticated administrators to execute arbitrary OS commands by navigating to the Diagnostics Ping page and entering shell metacharacters in the Target IP address field. (In some cases, authentication can be achieved with the comtech password for the comtech account.)