Summary
Detail | |||
---|---|---|---|
Vendor | Wavlink | First view | 2022-07-25 |
Product | Wifi-Repeater Firmware | Last view | 2022-07-25 |
Version | rpta2-77w.m4300.01.gd.2017sep19 | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:wavlink:wifi-repeater_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.7 | 2022-07-25 | CVE-2022-34575 | An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing fctest.shtml. |
5.7 | 2022-07-25 | CVE-2022-34574 | An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing Tftpd32.ini. |
6.3 | 2022-07-25 | CVE-2022-34573 | An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to arbitrarily configure device settings via accessing the page mb_wifibasic.shtml. |
5.7 | 2022-07-25 | CVE-2022-34572 | An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt. |
8 | 2022-07-25 | CVE-2022-34571 | An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
80% (4) | CWE-425 | Direct Request ('Forced Browsing') |
20% (1) | CWE-287 | Improper Authentication |