CVE-2023-30403

An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to bypass login by connecting to the web app after a successful attempt by a legitimate user.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:aigital:wireless-n_repeater_mini_router_firmware:0.131229:*:*:*:*:*:*:*
cpe:2.3:h:aigital:wireless-n_repeater_mini_router:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:00

Type Values Removed Values Added
References () https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt - Broken Link () https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt - Broken Link
References () https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ - Exploit, Third Party Advisory () https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ - Exploit, Third Party Advisory

Information

Published : 2023-05-02 20:15

Updated : 2024-11-21 08:00


NVD link : CVE-2023-30403

Mitre link : CVE-2023-30403

CVE.ORG link : CVE-2023-30403


JSON object : View

Products Affected

aigital

  • wireless-n_repeater_mini_router
  • wireless-n_repeater_mini_router_firmware
CWE
CWE-613

Insufficient Session Expiration