Aigital Wireless-N Repeater Mini_Router.0.131229 Authentication Bypass

2023.05.03
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Aigital Wireless-N Repeater - Login Bypass # Exploit Author: Matteo Mandolini # Date : 13/04/2023 # Vendor Homepage: https://web.archive.org/web/20220625053314/https://www.aigital.com/ # Version: Mini_Router.0.131229 Login bypass The device web application relies on a time-based mechanism to manage authentications. From the moment a legitimate user logs into the application with his or her credentials, any other user who can reach the web application is able to bypass the login and directly access the application's functionalities until the legitimate user's session expires.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top