An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to bypass login by connecting to the web app after a successful attempt by a legitimate user.
References
Link | Resource |
---|---|
https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt | Broken Link |
https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ | Exploit Third Party Advisory |
https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt | Broken Link |
https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt - Broken Link | |
References | () https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ - Exploit, Third Party Advisory |
Information
Published : 2023-05-02 20:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30403
Mitre link : CVE-2023-30403
CVE.ORG link : CVE-2023-30403
JSON object : View
Products Affected
aigital
- wireless-n_repeater_mini_router
- wireless-n_repeater_mini_router_firmware
CWE
CWE-613
Insufficient Session Expiration