vendor:
iB-WRA150N
by:
maxki4x
8.8
CVSS
HIGH
Hard coded accounts, Remote command execution
798
CWE
Product Name: iB-WRA150N
Affected Version From: 1.2.6 build 110401 Rel.47776n
Affected Version To: 1.2.6 build 110401 Rel.47776n
Patch Exists: NO
Related CWE: CVE-2018-6388
CPE: o:iball:ib-wra150n_firmware:1.2.6_build_110401_rel.47776n
Platforms Tested:
2018
Vulnerabilities in iB-WRA150N devices
The iB-WRA150N devices have hard coded accounts with default usernames and passwords. This allows an attacker to gain unauthorized access to the device. Additionally, the devices are vulnerable to remote command execution due to insufficient input filtering in the ping test arguments on the Diagnostics page. An attacker can inject arbitrary commands and retrieve sensitive files such as the /etc/passwd file.
Mitigation:
The vendor has not provided a solution or workaround for these vulnerabilities at the time of reporting. It is recommended to change the default usernames and passwords for the affected devices. Additionally, the input filtering should be improved to prevent remote command execution.