Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-7564


An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.


Published

2019-05-07T19:29:01.753

Last Modified

2024-11-21T04:48:19.810

Status

Modified

Source

[email protected]

Severity

CVSSv3.0: 9.8 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-306

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System coship rt3052_firmware 4.0.0.48 Yes
Hardware coship rt3052 - No
Operating System coship rt3050_firmware 4.0.0.40 Yes
Hardware coship rt3050 - No
Operating System coship wm3300_firmware 5.0.0.54 Yes
Operating System coship wm3300_firmware 5.0.0.55 Yes
Hardware coship wm3300 - No
Operating System coship rt7620_firmware 10.0.0.49 Yes
Hardware coship rt7620 - No

References