An issue in the time-based authentication mechanism of Aigital Aigital Wireless-N Repeater Mini_Router v0.131229 allows attackers to bypass login by connecting to the web app after a successful attempt by a legitimate user.
References
Link | Resource |
---|---|
https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt | Broken Link |
https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ | Exploit Third Party Advisory |
https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt | Broken Link |
https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt - Broken Link | |
References | () https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ - Exploit, Third Party Advisory |
10 May 2023, 16:47
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://mandomat.github.io/2023-04-13-testing-a-cheap-wifi-repeater/ - Exploit, Third Party Advisory | |
References | (MISC) https://dl.packetstormsecurity.net/2305-exploits/aigitalwnr-bypass.txt - Broken Link | |
CWE | CWE-613 | |
CPE | cpe:2.3:o:aigital:wireless-n_repeater_mini_router_firmware:0.131229:*:*:*:*:*:*:* cpe:2.3:h:aigital:wireless-n_repeater_mini_router:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
02 May 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-02 20:15
Updated : 2024-11-21 08:00
NVD link : CVE-2023-30403
Mitre link : CVE-2023-30403
CVE.ORG link : CVE-2023-30403
JSON object : View
Products Affected
aigital
- wireless-n_repeater_mini_router
- wireless-n_repeater_mini_router_firmware
CWE
CWE-613
Insufficient Session Expiration