Filter

MikroTik devicesMikroTik RouterOS Stack-Based Buffer Overflow Vulnerability

First published (updated )

MikroTik devicesThe container package in MikroTik RouterOS 7.4beta4 allows an attacker to create mount points pointi…

First published (updated )

MikroTik devicesThe Mikrotik RouterOS web server allows memory corruption in releases before Stable 6.38.5 and Long-…

First published (updated )

MikroTik devicesMikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp pro…

First published (updated )

MikroTik devicesMikroTik Router OS Directory Traversal Vulnerability

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesMikroTik RouterOS Administrator Privilege Escalation

First published (updated )

MikroTik devicesBuffer Overflow

First published (updated )

MikroTik devicesPath Traversal

8.8
First published (updated )

MikroTik devicesMikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot …

8.8
First published (updated )

MikroTik devicesRouterOS 6.45.6 Stable, RouterOS 6.44.5 Long-term, and below insufficiently validate where upgrade p…

8.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesMikroTik RouterOS 6.47.9 allows remote authenticated ftp users to create or overwrite arbitrary .rsc…

8.5
First published (updated )

MikroTik devicesPath Traversal

8.1
First published (updated )

MikroTik devicesAn issue was discovered in MikroTik RouterOS 6.41.4. Missing OpenVPN server certificate verification…

8.1
First published (updated )

MikroTik devicesBuffer Overflow

8.1
First published (updated )

MikroTik devicesA vulnerability in the FTP daemon on MikroTik routers through 6.44.3 could allow remote attackers to…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesA vulnerability in MikroTik Version 6.38.5 could allow an unauthenticated remote attacker to exhaust…

7.8
First published (updated )

MikroTik devicesA vulnerability in the network stack of MikroTik Version 6.38.5 released 2017-03-09 could allow an u…

7.8
First published (updated )

MikroTik devicesThe MikroTik Router hAP Lite 6.25 has no protection mechanism for unsolicited TCP ACK packets in the…

7.8
First published (updated )

MikroTik devicesThe SSH daemon on MikroTik routers through v6.44.3 could allow remote attackers to generate CPU acti…

7.8
First published (updated )

Mikrotik Router FirmwareA vulnerability in MikroTik Version 6.41.4 could allow an unauthenticated remote attacker to exhaust…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Mikrotik Router FirmwareMikroTik v6.40.5 devices allow remote attackers to cause a denial of service via a flood of ICMP pac…

7.8
First published (updated )

MikroTik devicesBuffer Overflow

7.8
First published (updated )

MikroTik devices(0Day) (Pwn2Own) Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability

7.5
First published (updated )

MikroTik devices(0Day) (Pwn2Own) Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability

7.5
First published (updated )

MikroTik devicesZDI-23-710: (0Day) (Pwn2Own) Mikrotik RouterOS RADVD Out-Of-Bounds Write Remote Code Execution Vulnerability

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

MikroTik devicesMikroTik RouterOS Web Interface Heap Corruption

7.5
First published (updated )

MikroTik devicesMikroTik RouterOS before 6.43.12 (stable) and 6.42.12 (long-term) is vulnerable to an intermediary v…

7.5
First published (updated )

MikroTik devicesRouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below are vulnerable to a DNS unrelated data …

7.5
First published (updated )

MikroTik devicesRouterOS versions 6.45.6 Stable, 6.44.5 Long-term, and below allow remote unauthenticated attackers …

7.5
First published (updated )

MikroTik devicesInteger Underflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203