iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64) via the debugging console.
References
Link | Resource |
---|---|
https://payatu.com/ibaton-routers-responsible-disclosure/ | Exploit Third Party Advisory |
https://www.iball.co.in/Category/Baton/283 | Product Vendor Advisory |
https://payatu.com/ibaton-routers-responsible-disclosure/ | Exploit Third Party Advisory |
https://www.iball.co.in/Category/Baton/283 | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://payatu.com/ibaton-routers-responsible-disclosure/ - Exploit, Third Party Advisory | |
References | () https://www.iball.co.in/Category/Baton/283 - Product, Vendor Advisory |
21 Jun 2021, 18:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:iball:300m_2-port_wireless-n_broadband_router_firmware:ib-wrb302n20122017:*:*:*:*:*:*:* |
cpe:2.3:h:iball:ib-wrb302n:-:*:*:*:*:*:*:* cpe:2.3:o:iball:ib-wrb302n_firmware:ib-wrb302n20122017:*:*:*:*:*:*:* |
Information
Published : 2019-05-28 21:29
Updated : 2024-11-21 04:00
NVD link : CVE-2018-20008
Mitre link : CVE-2018-20008
CVE.ORG link : CVE-2018-20008
JSON object : View
Products Affected
iball
- ib-wrb302n_firmware
- ib-wrb302n