CVE-2019-6441
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
21/03/2019
Last modified:
24/08/2020
Description
An issue was discovered on Shenzhen Coship RT3050 4.0.0.40, RT3052 4.0.0.48, RT7620 10.0.0.49, WM3300 5.0.0.54, and WM3300 5.0.0.55 devices. The password reset functionality of the router doesn't have backend validation for the current password and doesn't require any type of authentication. By making a POST request to the apply.cgi file of the router, the attacker can change the admin username and password of the router.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:coship:rt3050_firmware:4.0.0.40:*:*:*:*:*:*:* | ||
cpe:2.3:h:coship:rt3050:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:coship:rt3052_firmware:4.0.0.48:*:*:*:*:*:*:* | ||
cpe:2.3:h:coship:rt3052:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:coship:rt7620_firmware:10.0.0.49:*:*:*:*:*:*:* | ||
cpe:2.3:h:coship:rt7620:-:*:*:*:*:*:*:* | ||
cpe:2.3:o:coship:wm3300_firmware:5.0.0.54:*:*:*:*:*:*:* | ||
cpe:2.3:o:coship:wm3300_firmware:5.0.0.55:*:*:*:*:*:*:* | ||
cpe:2.3:h:coship:wm3300:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html
- https://packetstormsecurity.com/files/151202/Coship-Wireless-Router-Unauthenticated-Admin-Password-Reset.html
- https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180
- https://www.anquanke.com/vul/id/1451446
- https://www.exploit-db.com/exploits/46180
- https://www.exploit-db.com/exploits/46180/