CVE-2019-16340

Belkin Linksys Velop 1.1.8.192419 devices allows remote attackers to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:linksys:velop_whw0303_firmware:1.1.8.192419:*:*:*:*:*:*:*
cpe:2.3:h:linksys:velop_whw0303:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:linksys:velop_whw0302_firmware:1.1.8.192419:*:*:*:*:*:*:*
cpe:2.3:h:linksys:velop_whw0302:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:linksys:velop_whw0301_firmware:1.1.8.192419:*:*:*:*:*:*:*
cpe:2.3:h:linksys:velop_whw0301:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:30

Type Values Removed Values Added
References () http://s3.amazonaws.com/downloads.linksys.com/support/assets/releasenotes/WHW03_A03_Velop_Customer_Release_Notes_1.1.9.195026.txt - Third Party Advisory () http://s3.amazonaws.com/downloads.linksys.com/support/assets/releasenotes/WHW03_A03_Velop_Customer_Release_Notes_1.1.9.195026.txt - Third Party Advisory
References () https://puzzor.github.io/Linksys-Velop-Authentication-bypass - Exploit, Third Party Advisory () https://puzzor.github.io/Linksys-Velop-Authentication-bypass - Exploit, Third Party Advisory
References () https://www.linksys.com/us/support-article?articleNum=207568 - Patch, Third Party Advisory () https://www.linksys.com/us/support-article?articleNum=207568 - Patch, Third Party Advisory

Information

Published : 2019-11-21 15:15

Updated : 2024-11-21 04:30


NVD link : CVE-2019-16340

Mitre link : CVE-2019-16340

CVE.ORG link : CVE-2019-16340


JSON object : View

Products Affected

linksys

  • velop_whw0302_firmware
  • velop_whw0301_firmware
  • velop_whw0302
  • velop_whw0303_firmware
  • velop_whw0303
  • velop_whw0301
CWE
CWE-425

Direct Request ('Forced Browsing')