First published: Mon Jul 08 2024(Updated: )
A hard-coded password vulnerability exists in the telnetd functionality of LevelOne WBR-6013 RER4_A_v3411b_2T2R_LEV_09_170623. A set of specially crafted network packets can lead to arbitrary command execution.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Level1 WBR-6013 | =rer4_a_v3411b_2t2r_lev_09_170623 | |
Level1 WBR-6013 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46685 has a high severity rating due to the potential for arbitrary command execution via telnetd.
To fix CVE-2023-46685, disable telnet access and use secure protocols for remote management.
CVE-2023-46685 specifically affects the LevelOne WBR-6013 with firmware version rer4_a_v3411b_2t2r_lev_09_170623.
CVE-2023-46685 is classified as a hard-coded password vulnerability.
Attackers can execute arbitrary commands on affected devices by sending specially crafted network packets.