The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996 | Exploit Third Party Advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1996 |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:57
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.0 |
08 Nov 2024, 18:27
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
First Time |
Level1 wbr-6012
Level1 wbr-6012 Firmware Level1 |
|
CPE | cpe:2.3:h:level1:wbr-6012:-:*:*:*:*:*:*:* cpe:2.3:o:level1:wbr-6012_firmware:r0.40e6:*:*:*:*:*:*:* |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996 - Exploit, Third Party Advisory |
01 Nov 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-30 14:15
Updated : 2024-11-21 08:57
NVD link : CVE-2024-23309
Mitre link : CVE-2024-23309
CVE.ORG link : CVE-2024-23309
JSON object : View
Products Affected
level1
- wbr-6012
- wbr-6012_firmware
CWE
CWE-291
Reliance on IP Address for Authentication