Browse all 5 CVE security advisories affecting Actiontec. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Actiontec develops networking hardware, including routers and modems, for residential and small business use. Historically, their products have been vulnerable to classes including remote code execution, cross-site scripting, and privilege escalation, often stemming from default credentials, unpatched firmware, and insecure web interfaces. While no major public security incidents have been widely documented, the persistent presence of vulnerabilities in their devices highlights ongoing security challenges. The five current CVEs reflect typical issues in consumer networking equipment, emphasizing the need for regular updates and proper hardening to mitigate potential exploitation risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-6146 | Actiontec WCB6200Q uh_get_postdata_withupload Stack-based Buffer Overflow Remote Code Execution Vulnerability — WCB6200QCWE-121 | 8.8 | - | 2024-06-18 |
| CVE-2024-6145 | Actiontec WCB6200Q Cookie Format String Remote Code Execution Vulnerability — WCB6200QCWE-134 | 8.8 | - | 2024-06-18 |
| CVE-2024-6144 | Actiontec WCB6200Q Multipart Boundary Stack-based Buffer Overflow Remote Code Execution Vulnerability — WCB6200QCWE-121 | 8.8 | - | 2024-06-18 |
| CVE-2024-6143 | Actiontec WCB6200Q uh_tcp_recv_header Buffer Overflow Remote Code Execution Vulnerability — WCB6200QCWE-120 | 8.8 | - | 2024-06-18 |
| CVE-2024-6142 | Actiontec WCB6200Q uh_tcp_recv_content Buffer Overflow Remote Code Execution Vulnerability — WCB6200QCWE-120 | 8.8 | - | 2024-06-18 |
This page lists every published CVE security advisory associated with Actiontec. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.