First published: Thu Oct 17 2024(Updated: )
Tenda G3 v15.01.0.5(2848_755)_EN was discovered to contain a hardcoded password vulnerability in /etc_ro/shadow, which allows attackers to log in as root
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tenda G3 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48192 is classified as a high-severity vulnerability due to the presence of a hardcoded password that allows root access.
To remediate CVE-2024-48192, users should update the Tenda G3 router firmware to the latest version provided by Tenda.
CVE-2024-48192 specifically affects the Tenda G3 router running firmware version 15.01.0.5(2848_755)_EN.
Exploiting CVE-2024-48192 allows attackers to log in as root using the hardcoded password found in the /etc_ro/shadow file.
Yes, a patch or firmware update is typically provided by Tenda to resolve CVE-2024-48192.