The application is vulnerable to an unauthenticated parameter
manipulation that allows an attacker to set the credentials to blank
giving her access to the admin panel. Also vulnerable to account
takeover and arbitrary password change.
manipulation that allows an attacker to set the credentials to blank
giving her access to the admin panel. Also vulnerable to account
takeover and arbitrary password change.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19775 | The application is vulnerable to an unauthenticated parameter manipulation that allows an attacker to set the credentials to blank giving her access to the admin panel. Also vulnerable to account takeover and arbitrary password change. |
Fixes
Solution
No solution given by the vendor.
Workaround
Electrolink has not responded to requests to work with CISA to mitigate these vulnerabilities. Users of the affected products are encouraged to contact Electrolink https://electrolink.com/contacts/ for additional information.
References
History
No history.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T22:35:34.937Z
Reserved: 2024-01-05T22:07:42.998Z
Link: CVE-2024-22179
Updated: 2024-08-01T22:35:34.937Z
Status : Awaiting Analysis
Published: 2024-04-18T22:15:09.850
Modified: 2024-11-21T08:55:44.090
Link: CVE-2024-22179
No data.
OpenCVE Enrichment
No data.
EUVD