Description
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-38879 | Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware. |
References
History
Wed, 21 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-21T17:55:39.230Z
Reserved: 2022-07-18T00:00:00.000Z
Link: CVE-2022-36159
Updated: 2024-08-03T10:00:04.266Z
Status : Modified
Published: 2022-09-26T11:15:09.560
Modified: 2025-05-21T18:15:47.550
Link: CVE-2022-36159
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD