Логотип exploitDog
bind:CVE-2019-7564
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-7564

Количество 2

Количество 2

nvd логотип

CVE-2019-7564

почти 7 лет назад

An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-7g2v-29mr-2f42

больше 3 лет назад

An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-7564

An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.

CVSS3: 9.8
5%
Низкий
почти 7 лет назад
github логотип
GHSA-7g2v-29mr-2f42

An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.

5%
Низкий
больше 3 лет назад

Уязвимостей на страницу