Логотип exploitDog
bind:CVE-2013-6918
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2013-6918

Количество 2

Количество 2

nvd логотип

CVE-2013-6918

около 12 лет назад

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

CVSS2: 5.8
EPSS: Низкий
github логотип

GHSA-4h67-x6gq-gwgq

больше 3 лет назад

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2013-6918

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

CVSS2: 5.8
0%
Низкий
около 12 лет назад
github логотип
GHSA-4h67-x6gq-gwgq

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу