CVE-2021-41300

ECOA BAS controller’s special page displays user account and passwords in plain text, thus unauthenticated attackers can access the page and obtain privilege with full functionality.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-5136-3e315-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ecoa:ecs_router_controller-ecs_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:ecs_router_controller-ecs:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:ecoa:riskbuster_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:ecoa:riskbuster:-:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:ecoa:riskterminator:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-09-30 11:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-41300

Mitre link : CVE-2021-41300

CVE.ORG link : CVE-2021-41300


JSON object : View

Products Affected

ecoa

  • riskterminator
  • ecs_router_controller-ecs_firmware
  • ecs_router_controller-ecs
  • riskbuster
  • riskbuster_firmware
CWE
CWE-522

Insufficiently Protected Credentials