Description
Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
Published: 2022-07-21
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Update to the latest version.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-37715 Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
History

No history.

Subscriptions

Allnet All-wr0500ac All-wr0500ac Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: INCD

Published:

Updated: 2024-08-03T09:22:10.317Z

Reserved: 2022-06-29T00:00:00.000Z

Link: CVE-2022-34767

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-21T16:15:09.247

Modified: 2024-11-21T07:10:08.750

Link: CVE-2022-34767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses