An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to bypass login by connecting to the web app after a successful attempt by a legitimate user.
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Link | Tags |
---|---|
https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ | third party advisory exploit |
https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt | broken link |