An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
References
Link | Resource |
---|---|
https://www.nccgroup.trust/us/our-research/?research=Technical+advisories | Exploit Third Party Advisory |
https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-11-30 11:15
Updated : 2021-12-03 07:56
NVD link : CVE-2021-43282
Mitre link : CVE-2021-43282
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
govicture
- wr1200
- wr1200_firmware