On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1. Read the entire file system; 2. Write to the file system; or 3. Execute any code that attacker desires (malicious or not).
References
Link | Resource |
---|---|
http://www.digitalwhisper.co.il/files/Zines/0x56/DW86-1-RepeaterHack.pdf | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-09-20 07:29
Updated : 2017-09-28 12:25
NVD link : CVE-2017-8772
Mitre link : CVE-2017-8772
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
twsz
- wifi_repeater
- wifi_repeater_firmware