An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.)
History

Tue, 03 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Victure
Victure rx1800 Firmware
Weaknesses CWE-863
CPEs cpe:2.3:o:victure:rx1800_firmware:en_v1.0.0_r12_110933:*:*:*:*:*:*:*
Vendors & Products Victure
Victure rx1800 Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 02 Dec 2024 22:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.)
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-12-02T00:00:00

Updated: 2024-12-03T18:52:23.081Z

Reserved: 2024-11-25T00:00:00

Link: CVE-2024-53937

cve-icon Vulnrichment

Updated: 2024-12-03T18:52:15.976Z

cve-icon NVD

Status : Received

Published: 2024-12-02T23:15:05.673

Modified: 2024-12-03T19:15:12.127

Link: CVE-2024-53937

cve-icon Redhat

No data.