Описание
Logitec LAN-W300N/R routers with firmware before 2.27 do not properly restrict login access, which allows remote attackers to obtain administrative privileges and modify settings via vectors related to PPPoE authentication.
Ссылки
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Broken Link
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Broken Link
- Vendor Advisory
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1Версия до 2.27 (исключая)
Одновременно
cpe:2.3:a:logitech:lan-w300n\/ru2_firmware:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:logitech:lan-w300n\/r:-:*:*:*:*:*:*:*
cpe:2.3:h:logitech:lan-w300n\/rs:-:*:*:*:*:*:*:*
cpe:2.3:h:logitech:lan-w300n\/ru2:-:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.07475
Низкий
10 Critical
CVSS2
Дефекты
CWE-264
Связанные уязвимости
github
больше 3 лет назад
Logitec LAN-W300N/R routers with firmware before 2.27 do not properly restrict login access, which allows remote attackers to obtain administrative privileges and modify settings via vectors related to PPPoE authentication.
EPSS
Процентиль: 92%
0.07475
Низкий
10 Critical
CVSS2
Дефекты
CWE-264