Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4h67-x6gq-gwgq

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

EPSS

Процентиль: 39%
0.00171
Низкий

Связанные уязвимости

nvd
около 12 лет назад

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

EPSS

Процентиль: 39%
0.00171
Низкий