CVE-2019-9160

WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a backdoor account allowing a remote attacker to login to the system via SSH (on TCP port 22345) and escalate to root (because the password for root is the WebUI admin password concatenated with a static string).
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:xinruidz:sundray_wan_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:xinruidz:sundray_wan_controller:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:51

Type Values Removed Values Added
References () http://www.cnvd.org.cn/flaw/show/CNVD-2019-07680 - Third Party Advisory () http://www.cnvd.org.cn/flaw/show/CNVD-2019-07680 - Third Party Advisory

Information

Published : 2019-04-18 22:29

Updated : 2024-11-21 04:51


NVD link : CVE-2019-9160

Mitre link : CVE-2019-9160

CVE.ORG link : CVE-2019-9160


JSON object : View

Products Affected

xinruidz

  • sundray_wan_controller
  • sundray_wan_controller_firmware
CWE
CWE-798

Use of Hard-coded Credentials