The Wi-Fi Protected Setup (WPS) implementation on Corega CG-WLR300GNV and CG-WLR300GNV-W devices does not restrict the number of PIN authentication attempts, which makes it easier for remote attackers to obtain network access via a brute-force attack.
References
Link | Resource |
---|---|
http://corega.jp/support/security/20160622_wlr300gnv.htm | Vendor Advisory |
http://jvn.jp/en/jp/JVN75028871/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000109 | Vendor Advisory |
http://corega.jp/support/security/20160622_wlr300gnv.htm | Vendor Advisory |
http://jvn.jp/en/jp/JVN75028871/index.html | Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000109 | Vendor Advisory |
Configurations
History
21 Nov 2024, 02:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://corega.jp/support/security/20160622_wlr300gnv.htm - Vendor Advisory | |
References | () http://jvn.jp/en/jp/JVN75028871/index.html - Vendor Advisory | |
References | () http://jvndb.jvn.jp/jvndb/JVNDB-2016-000109 - Vendor Advisory |
Information
Published : 2016-06-25 21:59
Updated : 2024-11-21 02:53
NVD link : CVE-2016-4824
Mitre link : CVE-2016-4824
CVE.ORG link : CVE-2016-4824
JSON object : View
Products Affected
corega
- cg-wlr300gnv
- cg-wlr300gnv-w_firmware
- cg-wlr300gnv-w
- cg-wlr300gnv_firmware
CWE
CWE-254
7PK - Security Features