SOOTEWAY Wi-Fi Range Extender v1.5 was discovered to use default credentials (the admin password for the admin account) to access the TELNET service, allowing attackers to erase/read/write the firmware remotely.
References
Link | Resource |
---|---|
https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 | Exploit Third Party Advisory |
https://www.amazon.it/SOOTEWAY-Ripetitore-Extender-Wireless-Wmplificatore/dp/B08G55T46P | Product |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-05-20T14:54:11
Updated: 2022-05-20T14:54:11
Reserved: 2021-04-02T00:00:00
Link: CVE-2021-30028
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-20T15:15:09.977
Modified: 2023-08-08T14:22:24.967
Link: CVE-2021-30028
JSON object: View
Redhat Information
No data.
CWE