1 results (0.003 seconds)
CVSS: 9.0EPSS: 0%CPEs: 2EXPL: 1

CVE-2021-30028
https://notcve.org/view.php?id=CVE-2021-30028
20 May 2022 — SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely. Se ha detectado que SOOTEWAY Wi-Fi Range Extender versión v1.5, usa credenciales por defecto (la contraseña de la cuenta de administrador) para acceder al servicio TELNET, lo que permite a atacantes borrar/leer/escribir el firmware de forma remota • https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 • CWE-287: Improper Authentication •