Search Results (8 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-24347 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2026-01-27 N/A
Improper input validation in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to manipulate files in the /tmp directory
CVE-2026-24345 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2026-01-27 N/A
Cross-Site Request Forgery in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI
CVE-2026-24346 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2026-01-27 N/A
Use of well-known default credentials in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to access protected areas in the web application
CVE-2026-24348 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2026-01-27 N/A
Multiple cross-site scripting vulnerabilities in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to execute arbitrary JavaScript code in the browser of other Admin UI users.
CVE-2026-24344 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2026-01-27 N/A
Multiple Buffer Overflows in Admin UI of EZCast Pro II version 1.17478.146 allow attackers to cause a program crash and potential remote code execution
CVE-2025-13954 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2025-12-12 N/A
Hard-coded cryptographic keys in Admin UI of EZCast Pro II version 1.17478.146 allows attackers to bypass authorization checks and gain full access to the admin UI
CVE-2025-13955 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2025-12-12 N/A
Predictable default Wi-Fi Password in Access Point functionality in EZCast Pro II version 1.17478.146 allows attackers in Wi-Fi range to gain access to the dongle by calculating the default password from observable device identifiers
CVE-2019-12305 1 Actions-micro 2 Ezcast Pro Ii, Ezcast Pro Ii Firmware 2024-11-21 6.5 Medium
In EZCast Pro II, the administrator password md5 hash is provided upon a web request. This hash can be cracked to access the administration panel of the device.