Описание
GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.
Ссылки
- Broken Link
- Broken Link
- ExploitThird Party Advisory
- Broken Link
- Broken Link
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:gl-inet:gl-ar750s_firmware:3.215:*:*:*:*:*:*:*
cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*
EPSS
Процентиль: 17%
0.00056
Низкий
5.9 Medium
CVSS3
Дефекты
CWE-294
Связанные уязвимости
CVSS3: 5.9
github
больше 2 лет назад
GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.
EPSS
Процентиль: 17%
0.00056
Низкий
5.9 Medium
CVSS3
Дефекты
CWE-294