Known Vulnerabilities for Lenels2 Lnl-x2210 Firmware by Carrier

Listed below are 8 of the newest known vulnerabilities associated with "Lenels2 Lnl-x2210 Firmware" by "Carrier".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-31486 An authenticated attacker can send a specially crafted route to the “edit_route.cgi” binary and have it execute shell com... 8.8 - HIGH 2022-06-06 2022-06-17
CVE-2022-31485 An unauthenticated attacker can send a specially crafted packets to update the “notes” section of the home page of the we... 5.3 - MEDIUM 2022-06-06 2022-06-17
CVE-2022-31484 An unauthenticated attacker can send a specially crafted network packet to delete a user from the web interface. This vulnera... 7.5 - HIGH 2022-06-06 2022-06-17
CVE-2022-31483 An authenticated attacker can upload a file with a filename including “..” and “/” to achieve the ability to upload t... 8.8 - HIGH 2022-06-06 2022-06-17
CVE-2022-31482 An unauthenticated attacker can send a specially crafted unauthenticated HTTP request to the device that can overflow a buffe... 7.5 - HIGH 2022-06-06 2022-06-17
CVE-2022-31481 An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer. This vulnerabi... 10 - CRITICAL 2022-06-06 2022-06-17
CVE-2022-31480 An unauthenticated attacker could arbitrarily upload firmware files to the target device, ultimately causing a Denial-of-Serv... 7.5 - HIGH 2022-06-06 2022-06-17
CVE-2022-31479 An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be ex... 9.8 - CRITICAL 2022-06-06 2023-06-29
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report