The LevelOne WBR-6012 router contains a vulnerability within its web application that allows unauthenticated disclosure of sensitive information, such as the WiFi WPS PIN, through a hidden page accessible by an HTTP request. Disclosure of this information could enable attackers to connect to the device's WiFi network.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1986 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
13 Nov 2024, 18:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:level1:wbr-6012:-:*:*:*:*:*:*:* cpe:2.3:o:level1:wbr-6012_firmware:r0.40e6:*:*:*:*:*:*:* |
|
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1986 - Third Party Advisory | |
First Time |
Level1
Level1 wbr-6012 Level1 wbr-6012 Firmware |
|
CWE | NVD-CWE-noinfo |
01 Nov 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
30 Oct 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-30 14:15
Updated : 2024-11-13 18:43
NVD link : CVE-2024-33626
Mitre link : CVE-2024-33626
CVE.ORG link : CVE-2024-33626
JSON object : View
Products Affected
level1
- wbr-6012
- wbr-6012_firmware
CWE