First published: Wed Oct 30 2024(Updated: )
A security flaw involving hard-coded credentials in LevelOne WBR-6012's web services allows attackers to gain unauthorized access during the first 30 seconds post-boot. Other vulnerabilities can force a reboot, circumventing the initial time restriction for exploitation.The backdoor string can be found at address 0x80100910 80100910 40 6d 21 74 ds "@m!t2K1" 32 4b 31 00 It is referenced by the function located at 0x800b78b0 and is used as shown in the pseudocode below: if ((SECOND_FROM_BOOT_TIME < 300) && (is_equal = strcmp(password,"@m!t2K1")) { return 1;} Where 1 is the return value to admin-level access (0 being fail and 3 being user).
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Level1 Wbr-6012 Firmware | =r0.40e6 | |
Level1 Wbr-6012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-28875 is considered a high-severity vulnerability due to the potential for unauthorized access via hard-coded credentials.
Fixing CVE-2024-28875 involves updating the LevelOne WBR-6012 firmware to the latest version provided by the manufacturer.
CVE-2024-28875 allows attackers to gain unauthorized access during the vulnerable period post-boot, posing serious security risks.
Yes, CVE-2024-28875 can be exploited remotely if an attacker is aware of the hard-coded credentials.
The affected device for CVE-2024-28875 is the LevelOne WBR-6012 with firmware version r0.40e6.