On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
References
Link | Resource |
---|---|
http://www.digitalwhisper.co.il/files/Zines/0x56/DW86-1-RepeaterHack.pdf | Technical Description Third Party Advisory |
http://www.digitalwhisper.co.il/files/Zines/0x56/DW86-1-RepeaterHack.pdf | Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 03:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.digitalwhisper.co.il/files/Zines/0x56/DW86-1-RepeaterHack.pdf - Technical Description, Third Party Advisory |
Information
Published : 2017-09-20 14:29
Updated : 2024-11-21 03:34
NVD link : CVE-2017-8771
Mitre link : CVE-2017-8771
CVE.ORG link : CVE-2017-8771
JSON object : View
Products Affected
twsz
- wifi_repeater_firmware
- wifi_repeater
CWE
CWE-798
Use of Hard-coded Credentials