First published: Fri Sep 29 2017(Updated: )
Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Intelbras Wrn 150 Firmware | =1.0.1 | |
Intelbras WRN 150 | ||
All of | ||
Intelbras Wrn 150 Firmware | =1.0.1 | |
Intelbras WRN 150 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14942 has been classified with a high severity due to its ability to allow remote attackers to bypass authentication.
To mitigate CVE-2017-14942, users should update their Intelbras WRN 150 firmware to a version later than 1.0.1 that addresses this vulnerability.
CVE-2017-14942 is associated with an authentication bypass attack, allowing unauthorized access to configuration files.
Only Intelbras WRN 150 firmware version 1.0.1 is known to be vulnerable to CVE-2017-14942.
Yes, CVE-2017-14942 can be exploited remotely by attackers to read sensitive configuration files.