A low privileged admin account with a weak default password of admin exists on the Foxconn FEMTO AP-FC4064-T AP_GT_B38_5.8.3lb15-W47 LTE Build 15. In addition, its web management page relies on the existence or values of cookies when performing security-critical operations. One can gain privileges by modifying cookies.
                
            References
                    | Link | Resource | 
|---|---|
| https://gist.github.com/ChuanYuan-Huang/a92b8b32980123d5fa9bf5a8299114bf | Exploit Third Party Advisory | 
| https://gist.github.com/ChuanYuan-Huang/a92b8b32980123d5fa9bf5a8299114bf | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 04:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gist.github.com/ChuanYuan-Huang/a92b8b32980123d5fa9bf5a8299114bf - Exploit, Third Party Advisory | 
Information
                Published : 2018-05-10 03:29
Updated : 2024-11-21 04:14
NVD link : CVE-2018-9112
Mitre link : CVE-2018-9112
CVE.ORG link : CVE-2018-9112
JSON object : View
Products Affected
                foxconn
- ap-fc4064-t
- ap-fc4064-t_firmware
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
