First published: Tue May 07 2019(Updated: )
An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Coship Rt3052 Firmware | =4.0.0.48 | |
Coship RT3052 | ||
Coship Rt3050 Firmware | =4.0.0.40 | |
Coship RT3050 | ||
Coship Wm3300 Firmware | =5.0.0.54 | |
Coship Wm3300 Firmware | =5.0.0.55 | |
Coship WM3300 | ||
Coship Rt7620 Firmware | =10.0.0.49 | |
Coship Rt7620 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7564 is an authentication bypass vulnerability discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices.
CVE-2019-7564 allows an attacker to change the password of the Wi-Fi network without any authentication.
CVE-2019-7564 has a severity level of critical with a score of 9.8.
To fix CVE-2019-7564, it is recommended to update the firmware of the Shenzhen Coship WM3300 WiFi Router to a version that addresses the authentication bypass vulnerability.
More information about CVE-2019-7564 can be found at the following reference link: http://packetstormsecurity.com/files/151595/Coship-Wireless-Router-4.0.0.x-5.0.0.x-Authentication-Bypass.html