USR IOT 4G LTE Industrial Cellular VPN Router v1.0.36 was discovered to contain hard-coded credentials for its highest privileged account. The credentials cannot be altered through normal operation of the device.
References
Link | Resource |
---|---|
https://www.pusr.com/ | Vendor Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php | Exploit Third Party Advisory |
https://www.pusr.com/ | Vendor Advisory |
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.pusr.com/ - Vendor Advisory | |
References | () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5705.php - Exploit, Third Party Advisory |
Information
Published : 2022-06-02 14:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29730
Mitre link : CVE-2022-29730
CVE.ORG link : CVE-2022-29730
JSON object : View
Products Affected
usr
- usr-g806_firmware
- usr-g808
- usr-g800v2_firmware
- usr-g806
- usr-lg220-l_firmware
- usr-g807_firmware
- usr-g808_firmware
- usr-lg220-l
- usr-g800v2
- usr-g807
CWE
CWE-798
Use of Hard-coded Credentials