Description
Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
No analysis available yet.
Remediation
Vendor Solution
Update to the latest version.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-37715 | Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly. |
References
| Link | Providers |
|---|---|
| https://www.gov.il/en/Departments/faq/cve_advisories |
|
History
No history.
Status: PUBLISHED
Assigner: INCD
Published:
Updated: 2024-08-03T09:22:10.317Z
Reserved: 2022-06-29T00:00:00.000Z
Link: CVE-2022-34767
No data.
Status : Modified
Published: 2022-07-21T16:15:09.247
Modified: 2024-11-21T07:10:08.750
Link: CVE-2022-34767
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD