First published: Thu Dec 31 2015(Updated: )
The web administration interface on ReadyNet WRT300N-DD devices with firmware 1.0.26 has a default password of admin for the admin account, which allows remote attackers to obtain administrative privileges by leveraging a LAN session.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Readynet Solutions Wrt300n-dd | =1.0.26 | |
Readynet Solutions Wrt300n-dd Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7280 is considered a high severity vulnerability due to the use of a default password that allows remote attackers to gain administrative privileges.
To fix CVE-2015-7280, change the default password for the admin account on the ReadyNet WRT300N-DD device to a strong, unique password.
CVE-2015-7280 affects users of ReadyNet WRT300N-DD devices running firmware version 1.0.26.
The potential impacts of CVE-2015-7280 include unauthorized access to the device's administration settings, leading to network compromise.
There is no patch available specifically for CVE-2015-7280; users must manually change the default password to mitigate the vulnerability.