First published: Wed Oct 30 2024(Updated: )
The WBR-6012 is a wireless SOHO router. It is a low-cost device which functions as an internet gateway for homes and small offices while aiming to be easy to configure and operate. In addition to providing a WiFi access point, the device serves as a 4-port wired router and implements a variety of common SOHO router capabilities such as port forwarding, quality-of-service, web-based administration, a DHCP server, a basic DMZ, and UPnP capabilities.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Level1 WBR-6012 Firmware | =r0.40e6 | |
Level1 WBR-6012 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28052 has been assigned a medium severity level due to potential risks associated with unauthorized access.
To fix CVE-2024-28052, users should update their Level1 WBR-6012 firmware to the latest version available.
CVE-2024-28052 specifically affects the Level1 WBR-6012 wireless SOHO router running firmware version r0.40e6.
Exploitation of CVE-2024-28052 could lead to unauthorized access to the network, compromising user data and network security.
As of now, there have been no widespread reports indicating that CVE-2024-28052 is being actively exploited in the wild.