An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
References
Link | Resource |
---|---|
https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ | Exploit Third Party Advisory |
https://www.nccgroup.trust/us/our-research/?research=Technical+advisories | Exploit Third Party Advisory |
https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ | Exploit Third Party Advisory |
https://www.nccgroup.trust/us/our-research/?research=Technical+advisories | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:28
Type | Values Removed | Values Added |
---|---|---|
References | () https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ - Exploit, Third Party Advisory | |
References | () https://www.nccgroup.trust/us/our-research/?research=Technical+advisories - Exploit, Third Party Advisory |
Information
Published : 2021-11-30 19:15
Updated : 2024-11-21 06:28
NVD link : CVE-2021-43282
Mitre link : CVE-2021-43282
CVE.ORG link : CVE-2021-43282
JSON object : View
Products Affected
govicture
- wr1200_firmware
- wr1200
CWE
CWE-798
Use of Hard-coded Credentials