Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-52662 | Ubiquiti U6-LR 6.6.65 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: In Ubiquiti's view there is no vulnerability as the Hardcoded Password should be after setup not before. |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 09 Dec 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ubiquiti U6-LR 6.6.65 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. | Ubiquiti U6-LR 6.6.65 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: In Ubiquiti's view there is no vulnerability as the Hardcoded Password should be after setup not before. |
Fri, 06 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ui
Ui u6-lr Firmware |
|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:o:ui:u6-lr_firmware:6.6.65:*:*:*:*:*:*:* | |
| Vendors & Products |
Ui
Ui u6-lr Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 06 Dec 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ubiquiti U6-LR 6.6.65 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-09T22:29:42.234Z
Reserved: 2024-12-06T00:00:00.000Z
Link: CVE-2024-54750
Updated: 2024-12-06T16:45:18.122Z
Status : Deferred
Published: 2024-12-06T16:15:23.013
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-54750
No data.
OpenCVE Enrichment
No data.
EUVD