Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-53257 | The router console is accessible without authentication at "data" field, and while a user needs to be logged in in order to modify the configuration, the session state is shared. If any other user is currently logged in, the anonymous user can execute commands in the context of the authenticated one. If the logged in user has administrative privileges, it is possible to use webadmin service configuration commands to create a new admin user with a chosen password. |
Tue, 03 Jun 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-PL
Published:
Updated: 2025-06-03T14:05:17.122Z
Reserved: 2023-11-24T11:53:46.294Z
Link: CVE-2023-49255
Updated: 2024-08-02T21:53:44.978Z
Status : Modified
Published: 2024-01-12T15:15:09.083
Modified: 2025-06-03T14:15:31.060
Link: CVE-2023-49255
No data.
OpenCVE Enrichment
No data.
EUVD