A vulnerability was determined in Cudy WR1200EA 2.3.7-20250113-121810. Affected is an unknown function of the file /etc/shadow. Executing manipulation can lead to use of default password. The attack needs to be launched locally. A high complexity level is associated with this attack. The exploitability is told to be difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
The product uses default passwords for potentially critical functionality.
Link | Tags |
---|---|
https://vuldb.com/?id.321761 | vdb entry |
https://vuldb.com/?ctiid.321761 | permissions required signature |
https://vuldb.com/?submit.636138 | third party advisory |
https://github.com/ZZ2266/.github.io/tree/main/Cudy | related |
https://github.com/ZZ2266/.github.io/tree/main/Cudy#steps-to-reproduce | exploit |