CVE-2021-30028

SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sooteway_wi-fi_range_extender_project:sooteway_wi-fi_range_extender:1.5:*:*:*:*:*:*:*
cpe:2.3:h:sooteway_wi-fi_range_extender_project:sooteway_wi-fi_range_extender:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:03

Type Values Removed Values Added
References () https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - Exploit, Third Party Advisory () https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - Exploit, Third Party Advisory
References () https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P - Product () https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P - Product

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-306 CWE-287

Information

Published : 2022-05-20 15:15

Updated : 2024-11-21 06:03


NVD link : CVE-2021-30028

Mitre link : CVE-2021-30028

CVE.ORG link : CVE-2021-30028


JSON object : View

Products Affected

sooteway_wi-fi_range_extender_project

  • sooteway_wi-fi_range_extender
CWE
CWE-287

Improper Authentication