Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
2022-09-26T11:15:09.560
2025-05-21T18:15:47.550
Modified
CVSSv3.1: 8.8 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | contec | fxa3000_firmware | ≤ 1.13.00 | Yes |
Hardware | contec | fxa3000 | - | No |
Operating System | contec | fxa3020_firmware | ≤ 1.13.00 | Yes |
Hardware | contec | fxa3020 | - | No |
Operating System | contec | fxa3200_firmware | ≤ 1.13.00 | Yes |
Hardware | contec | fxa3200 | - | No |
Operating System | contec | fxa2000_firmware | < 1.39.00 | Yes |
Hardware | contec | fxa2000 | - | No |