Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j89h-7gpj-6wwq

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.

EPSS

Процентиль: 46%
0.0023
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость веб-интерфейса сотовых IP-шлюзов серии Moxa OnCell G3100-HSPA, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 46%
0.0023
Низкий