4ipnet EAP-767 v3.42.00 is vulnerable to Incorrect Access Control. The device uses the same set of credentials, regardless of how many times a user logs in, the content of the cookie remains unchanged.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/yckuo-sdc/PoC |
|
History
Tue, 25 Mar 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
4ipnet
4ipnet eap-767 4ipnet eap-767 Firmware |
|
| CPEs | cpe:2.3:h:4ipnet:eap-767:*:*:*:*:*:*:*:* cpe:2.3:o:4ipnet:eap-767_firmware:3.42.00:*:*:*:*:*:*:* |
|
| Vendors & Products |
4ipnet
4ipnet eap-767 4ipnet eap-767 Firmware |
Fri, 16 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-284 | |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-16T18:22:20.145Z
Reserved: 2024-01-25T00:00:00
Link: CVE-2024-24300
Updated: 2024-08-01T23:19:51.959Z
Status : Analyzed
Published: 2024-02-14T23:15:08.140
Modified: 2025-03-25T15:18:50.750
Link: CVE-2024-24300
No data.
OpenCVE Enrichment
No data.
Weaknesses