relay_cgi.cgi on Dingtian DT-R002 2CH relay devices with firmware 3.1.276A allows an attacker to replay HTTP post requests without the need for authentication or a valid signed/authorized request.
References
| Link | Resource |
|---|---|
| http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
| https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ | Exploit Third Party Advisory |
| https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ | Exploit Third Party Advisory |
| http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html | Exploit Third Party Advisory VDB Entry |
| https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ | Exploit Third Party Advisory |
| https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
21 Nov 2024, 06:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ - Exploit, Third Party Advisory | |
| References | () https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ - Exploit, Third Party Advisory |
05 Nov 2022, 02:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | (MISC) http://packetstormsecurity.com/files/167868/Dingtian-DT-R002-3.1.276A-Authentication-Bypass.html - Exploit, Third Party Advisory, VDB Entry |
29 Jul 2022, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Jul 2022, 01:38
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:dingtian-tech:dt-r004_firmware:3.1.276a:*:*:*:*:*:*:* cpe:2.3:h:dingtian-tech:dt-r004:-:*:*:*:*:*:*:* |
|
| CWE | CWE-294 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
| References | (MISC) https://www.trustwave.com/en-us/resources/security-resources/security-advisories/ - Exploit, Third Party Advisory | |
| References | (MISC) https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2022-29593-authentication-bypass-by-capture-replay-dingtian-dt-r002/ - Exploit, Third Party Advisory |
14 Jul 2022, 15:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2022-07-14 15:15
Updated : 2025-05-05 17:18
NVD link : CVE-2022-29593
Mitre link : CVE-2022-29593
CVE.ORG link : CVE-2022-29593
JSON object : View
Products Affected
dingtian-tech
- dt-r004
- dt-r004_firmware
CWE
CWE-294
Authentication Bypass by Capture-replay
