First published: Fri Sep 22 2023(Updated: )
Credential disclosure in the '/webs/userpasswd.htm' endpoint in Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 allows an authenticated attacker to leak the password for the administrative account via requests to the vulnerable endpoint.
Credit: disclosures@exodusintel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Juplink RX4-1500 Firmware | =1.0.4 | |
Juplink RX4-1500 Firmware | =1.0.5 | |
Juplink RX4-1500 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41027 is a vulnerability that allows an authenticated attacker to leak the password for the administrative account in the Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 through the '/webs/userpasswd.htm' endpoint.
CVE-2023-41027 has a severity rating of high (8 out of 10).
The Juplink RX4-1500 Wifi router firmware versions V1.0.4 and V1.0.5 are affected by CVE-2023-41027.
An attacker with authentication can exploit CVE-2023-41027 by making requests to the '/webs/userpasswd.htm' endpoint to leak the password for the administrative account.
At the moment, there is no known fix for CVE-2023-41027. It is recommended to update to a patched firmware version or contact the vendor for further assistance.