The captive portal in Inpiazza Cloud WiFi versions prior to v4.2.17 does not enforce limits on the number of attempts for password recovery, allowing attackers to brute force valid user accounts to gain access to login credentials.
References
Link | Resource |
---|---|
https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md | Exploit Third Party Advisory |
https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:05
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md - Exploit, Third Party Advisory |
09 Jun 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-307 | |
First Time |
Inpiazza
Inpiazza cloud Wifi |
|
CPE | cpe:2.3:a:inpiazza:cloud_wifi:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
01 Jun 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 20:15
Updated : 2024-11-21 08:05
NVD link : CVE-2023-33754
Mitre link : CVE-2023-33754
CVE.ORG link : CVE-2023-33754
JSON object : View
Products Affected
inpiazza
- cloud_wifi
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts