Логотип exploitDog
bind:CVE-2017-13717
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2017-13717

Количество 2

Количество 2

nvd логотип

CVE-2017-13717

больше 6 лет назад

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-q536-5rhj-7g9h

больше 3 лет назад

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2017-13717

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

CVSS3: 8.8
2%
Низкий
больше 6 лет назад
github логотип
GHSA-q536-5rhj-7g9h

Starry Station (aka Starry Router) sets the Access-Control-Allow-Origin header to "*". This allows any hosted file on any domain to make calls to the device's webserver and brute force the credentials and pull any information that is stored on the device. In this case, a user's Wi-Fi credentials are stored in clear text on the device and can be pulled easily.

CVSS3: 8.8
2%
Низкий
больше 3 лет назад

Уязвимостей на страницу