Belkin Linksys Velop 1.1.8.192419 devices allows remote attackers to discover the recovery key via a direct request for the /sysinfo_json.cgi URI.
References
Link | Resource |
---|---|
http://s3.amazonaws.com/downloads.linksys.com/support/assets/releasenotes/WHW03_A03_Velop_Customer_Release_Notes_1.1.9.195026.txt | Third Party Advisory |
https://www.linksys.com/us/support-article?articleNum=207568 | Patch Third Party Advisory |
https://puzzor.github.io/Linksys-Velop-Authentication-bypass | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2019-11-21 07:15
Updated : 2021-07-21 04:39
NVD link : CVE-2019-16340
Mitre link : CVE-2019-16340
JSON object : View
CWE
CWE-425
Direct Request ('Forced Browsing')
Products Affected
linksys
- velop_whw0303_firmware
- velop_whw0303
- velop_whw0302_firmware
- velop_whw0301_firmware
- velop_whw0302
- velop_whw0301