Belkin Linksys Velop 1.1.8.192419 devices allows remote attackers to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
References
Link | Resource |
---|---|
http://s3.amazonaws.com/downloads.linksys.com/support/assets/releasenotes/WHW03_A03_Velop_Customer_Release_Notes_1.1.9.195026.txt | Third Party Advisory |
https://puzzor.github.io/Linksys-Velop-Authentication-bypass | Exploit Third Party Advisory |
https://www.linksys.com/us/support-article?articleNum=207568 | Patch Third Party Advisory |
http://s3.amazonaws.com/downloads.linksys.com/support/assets/releasenotes/WHW03_A03_Velop_Customer_Release_Notes_1.1.9.195026.txt | Third Party Advisory |
https://puzzor.github.io/Linksys-Velop-Authentication-bypass | Exploit Third Party Advisory |
https://www.linksys.com/us/support-article?articleNum=207568 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://s3.amazonaws.com/downloads.linksys.com/support/assets/releasenotes/WHW03_A03_Velop_Customer_Release_Notes_1.1.9.195026.txt - Third Party Advisory | |
References | () https://puzzor.github.io/Linksys-Velop-Authentication-bypass - Exploit, Third Party Advisory | |
References | () https://www.linksys.com/us/support-article?articleNum=207568 - Patch, Third Party Advisory |
Information
Published : 2019-11-21 15:15
Updated : 2024-11-21 04:30
NVD link : CVE-2019-16340
Mitre link : CVE-2019-16340
CVE.ORG link : CVE-2019-16340
JSON object : View
Products Affected
linksys
- velop_whw0302_firmware
- velop_whw0301_firmware
- velop_whw0302
- velop_whw0303_firmware
- velop_whw0303
- velop_whw0301
CWE
CWE-425
Direct Request ('Forced Browsing')