Browsing the path: http://ip/wifi_ap_pata_get.cmd, will show in the name of the existing access point on the component, and a password in clear text.
References
Link | Resource |
---|---|
https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory |
https://www.gov.il/en/Departments/faq/cve_advisories | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.gov.il/en/Departments/faq/cve_advisories - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
Information
Published : 2022-07-18 13:15
Updated : 2024-11-21 07:03
NVD link : CVE-2022-30626
Mitre link : CVE-2022-30626
CVE.ORG link : CVE-2022-30626
JSON object : View
Products Affected
chcnav
- p5e_gnss_firmware
- p5e_gnss
CWE
CWE-312
Cleartext Storage of Sensitive Information