CVE-2019-12941
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
14/10/2019
Last modified:
07/11/2023
Description
AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:autopi:wi-fi\/nb_firmware:*:*:*:*:*:*:*:* | 2019-10-15 (excluding) | |
| cpe:2.3:h:autopi:wi-fi\/nb:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:autopi:4g\/lte_firmware:*:*:*:*:*:*:*:* | 2019-10-15 (excluding) | |
| cpe:2.3:h:autopi:4g\/lte:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



