Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
qcn6100_firmware Vendor: qualcomm

About This Product

qcn6100_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 77 known vulnerabilities affecting qualcomm qcn6100_firmware. This includes 7 critical-severity issues and 66 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2022 to 2026, indicating a recent active security attention. 4 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2021-35069 2022-02-11 2024-11-21 7.8 7.2 Unknown
CVE-2021-35088 2022-04-01 2024-11-21 8.2 6.4 Likely
CVE-2021-35103 2022-04-01 2024-11-21 7.8 7.2 Unknown
CVE-2021-35071 2022-06-14 2024-11-21 5.5 2.1 Unknown
CVE-2021-35129 2022-06-14 2024-11-21 7.8 7.2 Unknown
CVE-2022-25652 2022-09-16 2024-11-21 9.0 - -
CVE-2022-25736 2022-10-19 2025-05-09 7.5 - -
CVE-2022-25748 2022-10-19 2025-04-22 9.8 - -
CVE-2022-25749 2022-10-19 2025-04-22 7.5 - -
CVE-2022-25667 2022-11-15 2025-04-22 7.5 - -
CVE-2022-33236 2022-11-15 2025-04-22 7.5 - -
CVE-2022-33237 2022-11-15 2025-04-22 7.5 - -
CVE-2022-33239 2022-11-15 2025-04-22 7.5 - -
CVE-2022-25677 2022-12-13 2025-04-22 6.7 - -
CVE-2022-33235 2022-12-13 2025-04-22 8.2 - -
CVE-2022-33238 2022-12-13 2025-04-22 7.5 - -
CVE-2022-33252 2023-01-09 2025-04-09 8.2 - -
CVE-2022-33253 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33276 2023-01-09 2025-04-09 8.4 - -
CVE-2022-33283 2023-01-09 2025-04-09 8.2 - -
CVE-2022-33284 2023-01-09 2025-04-09 8.2 - -
CVE-2022-33285 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33286 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33271 2023-02-12 2024-11-21 8.2 - -
CVE-2022-33277 2023-02-12 2024-11-21 8.4 - -
CVE-2022-33279 2023-02-12 2024-11-21 9.8 - -
CVE-2022-33306 2023-02-12 2024-11-21 7.5 - -
CVE-2022-34145 2023-02-12 2024-11-21 7.5 - -
CVE-2022-34146 2023-02-12 2024-11-21 7.5 - -
CVE-2022-40502 2023-02-12 2024-11-21 7.5 - -
CVE-2022-40512 2023-02-12 2024-11-21 7.5 - -
CVE-2022-40514 2023-02-12 2024-11-21 9.8 - -
CVE-2022-40527 2023-03-10 2024-11-21 7.5 - -
CVE-2022-40530 2023-03-10 2024-11-21 8.4 - -
CVE-2022-40531 2023-03-10 2024-11-21 8.4 - -
CVE-2022-40532 2023-04-13 2024-11-21 8.4 - -
CVE-2022-22076 2023-06-06 2024-11-21 7.1 - -
CVE-2023-21658 2023-06-06 2024-11-21 7.5 - -
CVE-2023-21659 2023-06-06 2024-11-21 7.5 - -
CVE-2023-21661 2023-06-06 2024-11-21 7.5 - -
CVE-2023-22386 2023-07-04 2025-08-11 7.8 - -
CVE-2022-33275 2023-09-05 2024-11-21 8.4 - -
CVE-2023-28548 2023-09-05 2024-11-21 7.8 - -
CVE-2023-28549 2023-09-05 2024-11-21 7.8 - -
CVE-2023-28557 2023-09-05 2024-11-21 7.8 - -
CVE-2023-28567 2023-09-05 2024-11-21 7.8 - -
CVE-2023-28573 2023-09-05 2024-11-21 7.8 - -
CVE-2023-33026 2023-10-03 2025-08-11 7.5 - -
CVE-2023-33027 2023-10-03 2025-08-11 7.5 - -
CVE-2023-33028 2023-10-03 2025-08-11 9.8 - -
CVE-2023-33047 2023-11-07 2025-08-11 7.5 - -
CVE-2023-33080 2023-12-05 2025-08-11 7.5 - -
CVE-2023-33088 2023-12-05 2025-08-11 8.4 - -
CVE-2023-33089 2023-12-05 2025-08-11 7.5 - -
CVE-2023-33098 2023-12-05 2025-08-11 7.5 - -
CVE-2023-33062 2024-01-02 2025-08-11 7.5 - -
CVE-2023-33109 2024-01-02 2025-08-11 7.5 - -
CVE-2023-43511 2024-01-02 2025-08-11 7.5 - -
CVE-2023-43522 2024-02-06 2025-08-11 7.5 - -
CVE-2023-43536 2024-02-06 2025-08-11 7.5 - -
CVE-2023-28578 2024-03-04 2025-08-11 9.3 - -
CVE-2023-33105 2024-03-04 2025-01-10 7.5 - -
CVE-2024-21473 2024-04-01 2025-01-13 9.8 - -
CVE-2024-23368 2024-07-01 2024-11-21 7.8 - -
CVE-2024-38408 2024-11-04 2024-11-08 8.2 - -
CVE-2024-43057 2025-03-03 2025-08-11 7.8 - -
CVE-2025-21448 2025-04-07 2025-10-06 7.5 - -
CVE-2025-21446 2025-07-08 2025-08-11 7.5 - -
CVE-2025-27042 2025-07-08 2025-09-25 7.8 - -
CVE-2025-27061 2025-07-08 2025-08-11 7.8 - -
CVE-2025-27066 2025-08-06 2025-11-28 7.5 - -
CVE-2025-47318 2025-09-24 2025-11-28 7.5 - -
CVE-2025-27040 2025-10-09 2025-10-21 6.5 - -
CVE-2025-27059 2025-10-09 2025-10-21 8.8 - -
CVE-2025-27060 2025-10-09 2025-10-21 8.8 - -
CVE-2025-27074 2025-11-04 2025-11-05 8.8 - -
CVE-2025-47331 2026-01-07 2026-01-28 6.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm qcn6100_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.