Описание
SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.
Ссылки
- ExploitThird Party Advisory
- Product
- ExploitThird Party Advisory
- Product
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:sooteway_wi-fi_range_extender_project:sooteway_wi-fi_range_extender:1.5:*:*:*:*:*:*:*
cpe:2.3:h:sooteway_wi-fi_range_extender_project:sooteway_wi-fi_range_extender:-:*:*:*:*:*:*:*
EPSS
Процентиль: 56%
0.0034
Низкий
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.
EPSS
Процентиль: 56%
0.0034
Низкий
7.2 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-287