// For flags

CVE-2017-2283

 

Severity Score

8.0
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

WN-G300R3 firmware version 1.0.2 and earlier uses hardcoded credentials which may allow an attacker that can access the device to execute arbitrary code on the device.

Las versiones 1.0.2 y anteriores del firmware WN-G300R3 utilizan credenciales embebidas que pueden permitir a un atacante acceder al dispositivo para ejecutar código arbitrario en él.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-01 CVE Reserved
  • 2017-08-02 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-798: Use of Hard-coded Credentials
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Iodata
Search vendor "Iodata"
Wn-g300r3 Firmware
Search vendor "Iodata" for product "Wn-g300r3 Firmware"
<= 1.0.2
Search vendor "Iodata" for product "Wn-g300r3 Firmware" and version " <= 1.0.2"
-
Affected
in Iodata
Search vendor "Iodata"
Wn-g300r3
Search vendor "Iodata" for product "Wn-g300r3"
--
Safe