Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-7564

Опубликовано: 07 мая 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:coship:rt3052_firmware:4.0.0.48:*:*:*:*:*:*:*
cpe:2.3:h:coship:rt3052:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:coship:rt3050_firmware:4.0.0.40:*:*:*:*:*:*:*
cpe:2.3:h:coship:rt3050:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

Одно из

cpe:2.3:o:coship:wm3300_firmware:5.0.0.54:*:*:*:*:*:*:*
cpe:2.3:o:coship:wm3300_firmware:5.0.0.55:*:*:*:*:*:*:*
cpe:2.3:h:coship:wm3300:-:*:*:*:*:*:*:*
Конфигурация 4

Одновременно

cpe:2.3:o:coship:rt7620_firmware:10.0.0.49:*:*:*:*:*:*:*
cpe:2.3:h:coship:rt7620:-:*:*:*:*:*:*:*

EPSS

Процентиль: 90%
0.05119
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-306

Связанные уязвимости

github
больше 3 лет назад

An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.

EPSS

Процентиль: 90%
0.05119
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-306