relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ | Exploit Third Party Advisory |
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-07-14T14:56:44
Updated: 2022-07-29T16:06:19
Reserved: 2022-04-22T00:00:00
Link: CVE-2022-29593
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-07-14T15:15:08.093
Modified: 2022-11-05T02:45:26.543
Link: CVE-2022-29593
JSON object: View
Redhat Information
No data.
CWE