CVE-2021-43282

An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:govicture:wr1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:govicture:wr1200:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-11-30 19:15

Updated : 2024-02-28 18:48


NVD link : CVE-2021-43282

Mitre link : CVE-2021-43282

CVE.ORG link : CVE-2021-43282


JSON object : View

Products Affected

govicture

  • wr1200
  • wr1200_firmware
CWE
CWE-798

Use of Hard-coded Credentials