SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.
References
Link | Resource |
---|---|
https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 | Exploit Third Party Advisory |
https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P | Product |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-05-20 08:15
Updated : 2022-06-02 06:02
NVD link : CVE-2021-30028
Mitre link : CVE-2021-30028
JSON object : View
CWE
CWE-306
Missing Authentication for Critical Function
Products Affected
sooteway_wi-fi_range_extender_project
- sooteway_wi-fi_range_extender