The Strong Universal Repeater 300 allows unauthorised retrieval of configuration data and the admin password vulnerability / CVE pending
The unauthenticated remote attack vector needs to craft a URL to download a plaintext configuration file named profile.bin or parsing the set_safety.html file to find the syspasswd field.
The Strong Universal Repeater 300 lacks any security controls for the configuration file and password change web page. This absence allows the disclosure of configuration details and passwords, leading to potential device takeover and denial-of-service attacks.
The Strong Universal Repeater 300 lacks any security controls for the configuration file and password change web page. This absence allows the disclosure of configuration details and passwords, leading to potential device takeover and denial-of-service attacks.
Comments
Post a Comment