First published: Mon Jul 25 2022(Updated: )
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wavlink Wifi-repeater Firmware | =rpta2-77w.m4300.01.gd.2017sep19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34572 is an access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 that allows attackers to obtain the telnet password.
CVE-2022-34572 allows attackers to obtain the telnet password by accessing the page tftp.txt.
CVE-2022-34572 has a severity rating of medium (5.7).
To fix CVE-2022-34572, it is recommended to update the Wavlink WiFi-Repeater firmware to a version that addresses the access control issue.
More information about CVE-2022-34572 can be found at the following references: [link1](https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md) [link2](https://www.wavlink.com/en_us/category/REPEATER.html)