Browse all 4 CVE security advisories affecting Genexis. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Genexis develops networking equipment, primarily focusing on cable and fiber solutions for residential and business connectivity. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. The company has addressed multiple critical flaws, including authentication bypass issues in their home routers and gateways. While no major public security incidents have been widely reported, the presence of four CVEs indicates ongoing security challenges that require continuous patch management and secure development practices to mitigate risks in their networking infrastructure.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-8022 | Genexis Tilgin Home Gateway cross site scripting — Tilgin Home GatewayCWE-79 | 3.5 | Low | 2024-08-20 |
| CVE-2024-6108 | Genexis Tilgin Home Gateway Login cross site scripting — Tilgin Home GatewayCWE-80 | 4.3 | Medium | 2024-06-18 |
This page lists every published CVE security advisory associated with Genexis. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.