The Web portal of the WiFi module of VPNCrypt M10 2.6.5 allows unauthenticated users to send HTTP POST request to several critical Administrative functions such as, changing credentials of the Administrator account or connect the product to a rogue access point.
References
Link | Resource |
---|---|
https://www.stengg.com/cybersecurity | Third Party Advisory |
https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf | Third Party Advisory |
https://www.stengg.com/cybersecurity | Third Party Advisory |
https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.stengg.com/cybersecurity - Third Party Advisory | |
References | () https://www.stengg.com/media/1076253/vpncrypt-m10-cve-advisory-notice.pdf - Third Party Advisory |
Information
Published : 2020-08-12 19:15
Updated : 2024-11-21 04:59
NVD link : CVE-2020-12106
Mitre link : CVE-2020-12106
CVE.ORG link : CVE-2020-12106
JSON object : View
Products Affected
stengg
- vpncrypt_m10
- vpncrypt_m10_firmware
CWE
CWE-306
Missing Authentication for Critical Function