CVE-2022-38789

An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:airties:air_4920_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airties:air_4920:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:airties:air_4921_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airties:air_4921:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:airties:air_4971_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:airties:air_4971:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:17

Type Values Removed Values Added
References () https://airties.com/airties-information-security-policy/ - Vendor Advisory () https://airties.com/airties-information-security-policy/ - Vendor Advisory
References () https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/Description - Third Party Advisory () https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/Description - Third Party Advisory

Information

Published : 2022-09-15 12:15

Updated : 2024-11-21 07:17


NVD link : CVE-2022-38789

Mitre link : CVE-2022-38789

CVE.ORG link : CVE-2022-38789


JSON object : View

Products Affected

airties

  • air_4971
  • air_4971_firmware
  • air_4920
  • air_4921
  • air_4920_firmware
  • air_4921_firmware
CWE
CWE-639

Authorization Bypass Through User-Controlled Key