SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.
References
Link | Resource |
---|---|
https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 | Exploit Third Party Advisory |
https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P | Product |
https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 | Exploit Third Party Advisory |
https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P | Product |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - Exploit, Third Party Advisory | |
References | () https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P - Product |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-287 |
Information
Published : 2022-05-20 15:15
Updated : 2024-11-21 06:03
NVD link : CVE-2021-30028
Mitre link : CVE-2021-30028
CVE.ORG link : CVE-2021-30028
JSON object : View
Products Affected
sooteway_wi-fi_range_extender_project
- sooteway_wi-fi_range_extender
CWE
CWE-287
Improper Authentication