CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/basic_sett.html. Any user connected to the Wi-Fi can exploit this.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://medium.com/%40v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 - |
07 Nov 2023, 03:05
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-08-29 18:15
Updated : 2024-11-21 04:29
NVD link : CVE-2019-15806
Mitre link : CVE-2019-15806
CVE.ORG link : CVE-2019-15806
JSON object : View
Products Affected
commscope
- tr4400_firmware
- tr4400
CWE
CWE-326
Inadequate Encryption Strength