Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-25hw-5mq3-gfwx

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is able to reset its own password. This process has a vulnerability which can be used to take over the administrator account and results in shell access. As the admin user may read the /etc/shadow file, the password hashes of each user (including root) can be dumped. The root hash can be cracked easily which results in a complete system compromise.

In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is able to reset its own password. This process has a vulnerability which can be used to take over the administrator account and results in shell access. As the admin user may read the /etc/shadow file, the password hashes of each user (including root) can be dumped. The root hash can be cracked easily which results in a complete system compromise.

EPSS

Процентиль: 93%
0.10597
Средний

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 8.8
nvd
больше 4 лет назад

In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is able to reset its own password. This process has a vulnerability which can be used to take over the administrator account and results in shell access. As the admin user may read the /etc/shadow file, the password hashes of each user (including root) can be dumped. The root hash can be cracked easily which results in a complete system compromise.

EPSS

Процентиль: 93%
0.10597
Средний

Дефекты

CWE-287