CVE-2021-43284

An issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:govicture:wr1200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:govicture:wr1200:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ - Exploit, Third Party Advisory () https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ - Exploit, Third Party Advisory
References () https://www.nccgroup.trust/us/our-research/?research=Technical+advisories - Exploit, Third Party Advisory () https://www.nccgroup.trust/us/our-research/?research=Technical+advisories - Exploit, Third Party Advisory

Information

Published : 2021-11-30 19:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43284

Mitre link : CVE-2021-43284

CVE.ORG link : CVE-2021-43284


JSON object : View

Products Affected

govicture

  • wr1200_firmware
  • wr1200
CWE
CWE-798

Use of Hard-coded Credentials