Description
Disclosure of information - the system allows you to view usernames and passwords without permissions, thus it will be possible to enter the system. Path access: http://api/sys_username_passwd.cmd - The server loads the request clearly by default. Disclosure of hard-coded credit information within the JS code sent to the customer within the Login.js file is a strong user (which is not documented) and also the password, which allow for super-user access. Username: chcadmin, Password: chcpassword.
Published: 2022-07-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-52453 Disclosure of information - the system allows you to view usernames and passwords without permissions, thus it will be possible to enter the system. Path access: http://api/sys_username_passwd.cmd - The server loads the request clearly by default. Disclosure of hard-coded credit information within the JS code sent to the customer within the Login.js file is a strong user (which is not documented) and also the password, which allow for super-user access. Username: chcadmin, Password: chcpassword.
History

No history.

Subscriptions

Chcnav P5e Gnss P5e Gnss Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: INCD

Published:

Updated: 2024-09-17T02:53:15.209Z

Reserved: 2022-05-12T00:00:00.000Z

Link: CVE-2022-30622

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-17T21:15:08.803

Modified: 2024-11-21T07:03:02.770

Link: CVE-2022-30622

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses