CVE-2019-9160

WAC on the Sangfor Sundray WLAN Controller version 3.7.4.2 and earlier has a backdoor account allowing a remote attacker to login to the system via SSH (on TCP port 22345) and escalate to root (because the password for root is the WebUI admin password concatenated with a static string).
References
Link Resource
http://www.cnvd.org.cn/flaw/show/CNVD-2019-07680 Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:xinruidz:sundray_wan_controller_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:xinruidz:sundray_wan_controller:-:*:*:*:*:*:*:*

Information

Published : 2019-04-18 15:29

Updated : 2019-04-19 09:27


NVD link : CVE-2019-9160

Mitre link : CVE-2019-9160


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

xinruidz

  • sundray_wan_controller
  • sundray_wan_controller_firmware