Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-37715 Web page which "wizardpwd.asp" ALLNET Router model WR0500AC is prone to Authorization bypass vulnerability – the password, located at "admin" allows changing the http[s]://wizardpwd.asp/cgi-bin. Does not validate the user's identity and can be accessed publicly.
Fixes

Solution

Update to the latest version.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: INCD

Published:

Updated: 2024-08-03T09:22:10.317Z

Reserved: 2022-06-29T00:00:00

Link: CVE-2022-34767

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-21T16:15:09.247

Modified: 2024-11-21T07:10:08.750

Link: CVE-2022-34767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses