Логотип exploitDog
bind:CVE-2026-30702
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-30702

Количество 2

Количество 2

nvd логотип

CVE-2026-30702

около 2 месяцев назад

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-4mf8-x363-f56c

около 2 месяцев назад

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2026-30702

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing

CVSS3: 9.8
0%
Низкий
около 2 месяцев назад
github логотип
GHSA-4mf8-x363-f56c

The WiFi Extender WDR201A (HW V2.1, FW LFMZX28040922V1.02) implements a broken authentication mechanism in its web management interface. The login page does not properly enforce session validation, allowing attackers to bypass authentication by directly accessing restricted web application endpoints through forced browsing

CVSS3: 9.8
0%
Низкий
около 2 месяцев назад

Уязвимостей на страницу