CVE-2017-14244

An authentication bypass vulnerability on iBall Baton ADSL2+ Home Router FW_iB-LR7011A_1.0.2 devices potentially allows attackers to directly access administrative router settings by crafting URLs with a .cgi extension, as demonstrated by /info.cgi and /password.cgi.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:iball:ib-wra150n_firmware:fw_ib-lr7011a_1.0.2:*:*:*:*:*:*:*
cpe:2.3:h:iball:ib-wra150n:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:12

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/42740/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42740/ - Third Party Advisory, VDB Entry
References () https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broadband-modem-authentication-bypass - Third Party Advisory () https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broadband-modem-authentication-bypass - Third Party Advisory

Information

Published : 2017-09-17 19:29

Updated : 2024-11-21 03:12


NVD link : CVE-2017-14244

Mitre link : CVE-2017-14244

CVE.ORG link : CVE-2017-14244


JSON object : View

Products Affected

iball

  • ib-wra150n
  • ib-wra150n_firmware
CWE
CWE-425

Direct Request ('Forced Browsing')