FURUNO FELCOM 250 and 500 devices use only client-side JavaScript in login.js for authentication.
References
Link | Resource |
---|---|
https://cyberskr.com/blog/furuno-felcom.html | Exploit Technical Description Third Party Advisory |
https://gist.github.com/CyberSKR/34a8d6be7646a4bfd4df455f9f52500f | Third Party Advisory |
https://cyberskr.com/blog/furuno-felcom.html | Exploit Technical Description Third Party Advisory |
https://gist.github.com/CyberSKR/34a8d6be7646a4bfd4df455f9f52500f | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://cyberskr.com/blog/furuno-felcom.html - Exploit, Technical Description, Third Party Advisory | |
References | () https://gist.github.com/CyberSKR/34a8d6be7646a4bfd4df455f9f52500f - Third Party Advisory |
Information
Published : 2018-09-06 23:29
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16590
Mitre link : CVE-2018-16590
CVE.ORG link : CVE-2018-16590
JSON object : View
Products Affected
furuno
- felcom_500_firmware
- felcom_250
- felcom_250_firmware
- felcom_500
CWE
CWE-287
Improper Authentication