An Insecure Permissions vulnerability in Shenzhen Zhiboton Electronics ZBT WE1626 Router v 21.06.18 allows attackers to obtain sensitive information via SPI bus interface connected to pinout of the NAND flash memory.
References
Link | Resource |
---|---|
http://shenzhen.com | Broken Link |
http://zbt.com | Vendor Advisory |
https://blog.prodefense.io/zbt-we1626-wireless-router-cve-disclosures-b3534484d97d | Exploit Third Party Advisory |
http://shenzhen.com | Broken Link |
http://zbt.com | Vendor Advisory |
https://blog.prodefense.io/zbt-we1626-wireless-router-cve-disclosures-b3534484d97d | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://shenzhen.com - Broken Link | |
References | () http://zbt.com - Vendor Advisory | |
References | () https://blog.prodefense.io/zbt-we1626-wireless-router-cve-disclosures-b3534484d97d - Exploit, Third Party Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2023-03-03 13:15
Updated : 2024-11-21 07:29
NVD link : CVE-2022-45552
Mitre link : CVE-2022-45552
CVE.ORG link : CVE-2022-45552
JSON object : View
Products Affected
zbt
- we1626
- we1626_firmware
CWE