CVE-2022-3203

On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.
References
Link Resource
https://mads.uniud.it/2022/09/lord-of-the-orings/ Exploit Mitigation Third Party Advisory
https://mads.uniud.it/2022/09/lord-of-the-orings/ Exploit Mitigation Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:oringnet:iap-420\+_firmware:2.0m:*:*:*:*:*:*:*
cpe:2.3:h:oringnet:iap-420\+:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:oringnet:iap-420_firmware:2.0m:*:*:*:*:*:*:*
cpe:2.3:h:oringnet:iap-420:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:19

Type Values Removed Values Added
References () https://mads.uniud.it/2022/09/lord-of-the-orings/ - Exploit, Mitigation, Third Party Advisory () https://mads.uniud.it/2022/09/lord-of-the-orings/ - Exploit, Mitigation, Third Party Advisory

Information

Published : 2022-10-21 13:15

Updated : 2024-11-21 07:19


NVD link : CVE-2022-3203

Mitre link : CVE-2022-3203

CVE.ORG link : CVE-2022-3203


JSON object : View

Products Affected

oringnet

  • iap-420
  • iap-420\+
  • iap-420_firmware
  • iap-420\+_firmware
CWE
CWE-912

Hidden Functionality