CVE-2022-29525

Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rakuten:casa:ap_f_v1_4_1:*:*:*:*:*:*:*
cpe:2.3:a:rakuten:casa:ap_f_v2_0_0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry () https://jvn.jp/en/jp/JVN46892984/index.html - Third Party Advisory, VDB Entry
References () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory () https://network.mobile.rakuten.co.jp/information/news/product/1033/ - Vendor Advisory

Information

Published : 2022-06-13 05:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29525

Mitre link : CVE-2022-29525

CVE.ORG link : CVE-2022-29525


JSON object : View

Products Affected

rakuten

  • casa
CWE
CWE-798

Use of Hard-coded Credentials