Filter
AND

MikroTik devicesMikroTik Router OS Directory Traversal Vulnerability

First published (updated )

MikroTik devicesMikroTik RouterOS Stack-Based Buffer Overflow Vulnerability

First published (updated )

MikroTik devicesMikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp pro…

First published (updated )

MikroTik devicesMikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot …

8.8
First published (updated )

MikroTik devicesPath Traversal

8.1
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesMikroTik RouterOS before 6.43.12 (stable) and 6.42.12 (long-term) is vulnerable to an intermediary v…

7.5
First published (updated )

MikroTik devicesAn issue discovered in MikroTik Router v6.46.3 and earlier allows attacker to cause denial of servic…

7.5
First published (updated )

MikroTik devicesMikroTik RouterOS Administrator Privilege Escalation

First published (updated )

MikroTik devicesMikroTik RouterOS Web Interface Heap Corruption

7.5
First published (updated )

MikroTik devices(0Day) (Pwn2Own) Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesMikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a memory exhaustion vulnerability. An au…

First published (updated )

MikroTik devicesMikrotik RouterOS before 6.42.7 and 6.40.9 is vulnerable to a stack exhaustion vulnerability. An aut…

First published (updated )

MikroTik devicesBuffer Overflow

First published (updated )

MikroTik devicesMikroTik RouterOS v7.1 to 7.11 was discovered to contain incorrect access control mechanisms in plac…

First published (updated )

MikroTik devicesInput Validation

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesThe winbox service in MikroTik RouterOS 5.15 and earlier allows remote attackers to cause a denial o…

First published (updated )

MikroTik devicesCSRF

First published (updated )

MikroTik devicesThe Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-…

First published (updated )

MikroTik devicesA vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust…

7.8
First published (updated )

MikroTik devicesA vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an u…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesThe L2TP Client in MikroTik RouterOS versions 6.83.3 and 6.37.4 does not enable IPsec encryption aft…

First published (updated )

MikroTik devicesAn issue was discovered in MikroTik RouterOS 6.41.4. Missing OpenVPN server certificate verification…

8.1
First published (updated )

MikroTik devicesAn issue was discovered in Mikrotik RouterOS. Crafting a packet that has a size of 1 byte and sendin…

7.5
First published (updated )

MikroTik devicesBuffer Overflow

First published (updated )

MikroTik devicesInteger Underflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesPath Traversal

First published (updated )

MikroTik devicesMikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to memory exhaustion. By send…

First published (updated )

MikroTik devicesMikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to stack exhaustion. By sendi…

First published (updated )

MikroTik devicesA vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to…

7.8
First published (updated )

MikroTik devicesMikroTik Winbox 3.20 and below is vulnerable to man in the middle attacks. A man in the middle can d…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203