GL.iNET GL-AR750S-Ext firmware v3.215 uses an insecure protocol in its communications which allows attackers to eavesdrop via a man-in-the-middle attack.
References
Link | Resource |
---|---|
http://gl-ar750s-ext.com | Broken Link |
http://glinet.com | Product |
https://justinapplegate.me/2023/glinet-CVE-2023-33620/ | Exploit Third Party Advisory |
http://gl-ar750s-ext.com | Broken Link |
http://glinet.com | Product |
https://justinapplegate.me/2023/glinet-CVE-2023-33620/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://gl-ar750s-ext.com - Broken Link | |
References | () http://glinet.com - Product | |
References | () https://justinapplegate.me/2023/glinet-CVE-2023-33620/ - Exploit, Third Party Advisory |
23 Jun 2023, 02:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
Gl-inet gl-ar750s
Gl-inet Gl-inet gl-ar750s Firmware |
|
References | (MISC) http://gl-ar750s-ext.com - Broken Link | |
References | (MISC) http://glinet.com - Product | |
References | (MISC) https://justinapplegate.me/2023/glinet-CVE-2023-33620/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
CPE | cpe:2.3:o:gl-inet:gl-ar750s_firmware:3.215:*:*:*:*:*:*:* cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:* |
|
CWE | CWE-522 |
13 Jun 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-13 17:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33620
Mitre link : CVE-2023-33620
CVE.ORG link : CVE-2023-33620
JSON object : View
Products Affected
gl-inet
- gl-ar750s
- gl-ar750s_firmware
CWE
CWE-522
Insufficiently Protected Credentials