Описание
Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.0067
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-798
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
EPSS
Процентиль: 71%
0.0067
Низкий
9.8 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-798