First published: Tue Nov 30 2021(Updated: )
An issue was discovered on Victure WR1200 devices through 1.0.3. The root SSH password never gets updated from its default value of admin. This enables an attacker to gain control of the device through SSH (regardless of whether the admin password was changed on the web interface).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Govicture WR1200 Firmware | <=1.0.3 | |
Greenpacket WR-1200 | ||
All of | ||
Govicture WR1200 Firmware | <=1.0.3 | |
Greenpacket WR-1200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-43284.
The severity of CVE-2021-43284 is high.
CVE-2021-43284 allows an attacker to gain control of Victure WR1200 devices through SSH.
The root SSH password on Victure WR1200 devices affected by CVE-2021-43284 is never updated from its default value of 'admin'.
To fix the vulnerability CVE-2021-43284, it is recommended to update the firmware of Victure WR1200 devices to a version that addresses this issue.