Browse all 4 CVE security advisories affecting Multilaser. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Multilaser, a Brazilian consumer electronics manufacturer, produces various devices including routers and IoT equipment. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from weak authentication mechanisms and unpatched firmware. The company has faced scrutiny for security lapses, with multiple CVEs documenting issues like hardcoded credentials and insecure interfaces. While no major public security incidents have been widely reported, the consistent pattern of vulnerabilities suggests potential risks for users relying on their networking and smart home products. Security researchers continue to identify flaws, highlighting the need for improved security practices in their product development lifecycle.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-5437 | Multilaser Sirius RE016 Password Change cstecgi.cgi improper authentication — Sirius RE016CWE-287 | 5.3 | Medium | 2025-06-02 |
| CVE-2025-5436 | Multilaser Sirius RE016 cstecgi.cgi information disclosure — Sirius RE016CWE-200 | 5.3 | Medium | 2025-06-02 |
| CVE-2023-0658 | Multilaser RE057/RE170 Backup File param.file.tgz information disclosure — RE057CWE-200 | 5.3 | Medium | 2023-02-02 |
| CVE-2023-0029 | Multilaser RE708 Telnet Service denial of service — RE708CWE-404 | 5.3 | Medium | 2023-01-01 |
This page lists every published CVE security advisory associated with Multilaser. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.