2 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 8EXPL: 1

Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware. Se ha detectado que Contec FXA3200 versiones 1.13 y anteriores, contienen una contraseña hash embebida para root almacenada en el componente /etc/shadow. Como la fuerza de la contraseña es débil, puede ser descifrada en pocos minutos. • https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 https://jvn.jp/en/vu/JVNVU98305100 https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section • CWE-798: Use of Hard-coded Credentials •

CVSS: 8.0EPSS: 0%CPEs: 8EXPL: 1

Contec FXA3200 version 1.13.00 and under suffers from Insecure Permissions in the Wireless LAN Manager interface which allows malicious actors to execute Linux commands with root privilege via a hidden web page (/usr/www/ja/mnt_cmd.cgi). Contec FXA3200 versiones 1.13.00 y anteriores, sufre de permisos no seguros en la interfaz del Wireless LAN Manager, lo que permite a actores maliciosos ejecutar comandos de Linux con privilegios de root por medio de una página web oculta (/usr/www/ja/mnt_cmd.cgi). • https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 https://jvn.jp/en/vu/JVNVU98305100 https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section • CWE-425: Direct Request ('Forced Browsing') •