vendor:
JT3500V
by:
LiquidWorm
8.8
CVSS
HIGH
Weak Default WiFi Password Algorithm
521
CWE
Product Name: JT3500V
Affected Version From: 2.0.0B01
Affected Version To: 2.0.1B1064
Patch Exists: No
Related CWE: N/A
CPE: h:kzbtech:jt3500v
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: None
2021
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 – Weak Default WiFi Password Algorithm
KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 is vulnerable to a weak default WiFi password algorithm. The default WiFi password is generated based on the MAC address of the device. The algorithm is predictable and can be easily guessed by an attacker. This allows an attacker to gain access to the device and potentially gain access to the network.
Mitigation:
Users should change the default WiFi password to a strong and unique password.