First published: Tue Nov 30 2021(Updated: )
An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Govicture WR1200 Firmware | <=1.0.3 | |
Greenpacket WR-1200 | ||
Govicture WR1200 Firmware | <=1.0.3 | |
Greenpacket WR-1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43282 is a vulnerability on Victure WR1200 devices through version 1.0.3 that exposes the default Wi-Fi WPA2 key through the router's MAC address.
The severity of CVE-2021-43282 is medium with a CVSS score of 6.5.
CVE-2021-43282 affects Victure WR1200 devices by exposing the default Wi-Fi WPA2 key to anyone within Wi-Fi range through the router's MAC address.
To fix CVE-2021-43282, it is recommended to update the firmware of your Victure WR1200 device to a version that addresses this vulnerability.
You can find more information about CVE-2021-43282 in the NCC Group technical advisory and research publications available at the provided references.