An issue discovered in Shenzhen Zhibotong Electronics WBT WE1626 Router v 21.06.18 allows attacker to execute arbitrary commands via serial connection to the UART port.
References
Link | Resource |
---|---|
http://shenzhen.com | Broken Link |
http://zbt.com | Vendor Advisory |
https://blog.prodefense.io/zbt-we1626-wireless-router-cve-disclosures-b3534484d97d | Exploit Third Party Advisory |
http://shenzhen.com | Broken Link |
http://zbt.com | Vendor Advisory |
https://blog.prodefense.io/zbt-we1626-wireless-router-cve-disclosures-b3534484d97d | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://shenzhen.com - Broken Link | |
References | () http://zbt.com - Vendor Advisory | |
References | () https://blog.prodefense.io/zbt-we1626-wireless-router-cve-disclosures-b3534484d97d - Exploit, Third Party Advisory |
Information
Published : 2023-03-03 13:15
Updated : 2024-11-21 07:29
NVD link : CVE-2022-45553
Mitre link : CVE-2022-45553
CVE.ORG link : CVE-2022-45553
JSON object : View
Products Affected
zbt
- we1626
- we1626_firmware
CWE