A low privileged admin account with a weak default password of admin exists on the Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15. In addition, its web management page relies on the existence or values of cookies when performing security-critical operations. One can gain privileges by modifying cookies.
References
Link | Resource |
---|---|
https://gist.github.com/ChuanYuan-Huang/a92b8b32980123d5fa9bf5a8299114bf | Exploit Third Party Advisory |
https://gist.github.com/ChuanYuan-Huang/a92b8b32980123d5fa9bf5a8299114bf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/ChuanYuan-Huang/a92b8b32980123d5fa9bf5a8299114bf - Exploit, Third Party Advisory |
Information
Published : 2018-05-10 03:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-9112
Mitre link : CVE-2018-9112
CVE.ORG link : CVE-2018-9112
JSON object : View
Products Affected
foxconn
- ap-fc4064-t
- ap-fc4064-t_firmware
CWE
CWE-798
Use of Hard-coded Credentials