Description
Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33862 | Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation. |
References
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-03T06:26:05.961Z
Reserved: 2022-05-13T00:00:00.000Z
Link: CVE-2022-29525
No data.
Status : Modified
Published: 2022-06-13T05:15:11.313
Modified: 2024-11-21T06:59:15.457
Link: CVE-2022-29525
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD