Описание
Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
Ссылки
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:allnet:all-wr0500ac_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:allnet:all-wr0500ac:-:*:*:*:*:*:*:*
EPSS
Процентиль: 44%
0.00213
Низкий
5.9 Medium
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-306
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
EPSS
Процентиль: 44%
0.00213
Низкий
5.9 Medium
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-306