Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6qvm-8hqf-vwf3

Опубликовано: 17 мар. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.

A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.

EPSS

Процентиль: 6%
0.00025
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-284
CWE-798

Связанные уязвимости

CVSS3: 6.7
nvd
11 месяцев назад

A use of hard-coded password vulnerability in FortiWLC version 8.5.2 and below, version 8.4.8 and below, version 8.3.3 to 8.3.2, version 8.2.7 to 8.2.6 may allow a local, authenticated attacker to connect to the managed Access Point (Meru AP and FortiAP-U) as root using the default hard-coded username and password.

EPSS

Процентиль: 6%
0.00025
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-284
CWE-798