An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.)
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Victure
Victure rx1800 Firmware |
|
Weaknesses | CWE-863 | |
CPEs | cpe:2.3:o:victure:rx1800_firmware:en_v1.0.0_r12_110933:*:*:*:*:*:*:* | |
Vendors & Products |
Victure
Victure rx1800 Firmware |
|
Metrics |
cvssV3_1
|
Mon, 02 Dec 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.) | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-12-02T00:00:00
Updated: 2024-12-03T18:52:23.081Z
Reserved: 2024-11-25T00:00:00
Link: CVE-2024-53937
Vulnrichment
Updated: 2024-12-03T18:52:15.976Z
NVD
Status : Received
Published: 2024-12-02T23:15:05.673
Modified: 2024-12-03T19:15:12.127
Link: CVE-2024-53937
Redhat
No data.