Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://0xmupa.github.io/pixlink-weak-telnet |
|
Mon, 30 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pix-link
Pix-link lv-wr22 |
|
| Weaknesses | CWE-284 | |
| CPEs | cpe:2.3:o:pix-link:lv-wr22:117.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Pix-link
Pix-link lv-wr22 |
|
| Metrics |
cvssV3_1
|
Mon, 30 Sep 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PIX-LINK LV-WR22 RE3002-P1-01_V117.0 is vulnerable to Improper Access Control. The TELNET service is enabled with weak credentials for a root-level account, without the possibility of changing them. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-30T17:30:49.069Z
Reserved: 2024-09-11T00:00:00.000Z
Link: CVE-2024-46280
Updated: 2024-09-30T17:30:43.679Z
Status : Deferred
Published: 2024-09-30T15:15:06.053
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-46280
No data.
OpenCVE Enrichment
No data.