No analysis available yet.
Vendor Solution
The vendor provides a firmware update to version 7.40 (or higher) which can be downloaded via the vendor's customer server portal.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Dec 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Dec 2024 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 12 Dec 2024 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The password change function at /cgi/admin.cgi does not require the current/old password, which makes the application vulnerable to account takeover. An attacker can use this to forcefully set a new password within the -rsetpass+-aaction+- parameter for a user without knowing the old password, e.g. by exploiting a CSRF issue. | |
| Title | Insecure Password Change Function | |
| Weaknesses | CWE-620 | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: SEC-VLab
Published:
Updated: 2025-11-03T21:54:28.078Z
Reserved: 2024-03-05T09:15:40.202Z
Link: CVE-2024-28143
Updated: 2025-11-03T21:54:28.078Z
Status : Awaiting Analysis
Published: 2024-12-12T14:15:22.173
Modified: 2025-11-03T22:16:50.213
Link: CVE-2024-28143
No data.
OpenCVE Enrichment
No data.