Логотип exploitDog
bind:CVE-2021-30028
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-30028

Количество 2

Количество 2

nvd логотип

CVE-2021-30028

больше 3 лет назад

SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-342q-q4xm-99r7

больше 3 лет назад

SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-30028

SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.

CVSS3: 7.2
0%
Низкий
больше 3 лет назад
github логотип
GHSA-342q-q4xm-99r7

SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.

CVSS3: 7.2
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу