An issue was discovered in Airties Smart Wi-Fi before 2020-08-04. It allows attackers to change the main/guest SSID and the PSK to arbitrary values, and map the LAN, because of Insecure Direct Object Reference.
References
Link | Resource |
---|---|
https://airties.com/airties-information-security-policy/ | Vendor Advisory |
https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/Description | Third Party Advisory |
https://airties.com/airties-information-security-policy/ | Vendor Advisory |
https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/Description | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 07:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://airties.com/airties-information-security-policy/ - Vendor Advisory | |
References | () https://github.com/ProxyStaffy/Airties-CVE-2022-38789/blob/main/Description - Third Party Advisory |
Information
Published : 2022-09-15 12:15
Updated : 2024-11-21 07:17
NVD link : CVE-2022-38789
Mitre link : CVE-2022-38789
CVE.ORG link : CVE-2022-38789
JSON object : View
Products Affected
airties
- air_4971
- air_4971_firmware
- air_4920
- air_4921
- air_4920_firmware
- air_4921_firmware
CWE
CWE-639
Authorization Bypass Through User-Controlled Key