relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ | Exploit Third Party Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-07-14 15:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-29593
Mitre link : CVE-2022-29593
CVE.ORG link : CVE-2022-29593
JSON object : View
Products Affected
dingtian-tech
- dt-r004
- dt-r004_firmware
CWE
CWE-294
Authentication Bypass by Capture-replay