Description
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to transmission of password in plain text. A remote attacker could exploit this vulnerability by intercepting transmission within an HTTP session on the vulnerable system.

Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
Published: 2024-07-26
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Upgrade SyroTech SY-GPON-1110-WDONT Router firmware to patched version 3.1.02-240517 http://drive.google.com/file/d/1JQc3AkJm69mV0kg2c-b-zzaojc87Rru9/view

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-39132 This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to transmission of password in plain text. A remote attacker could exploit this vulnerability by intercepting transmission within an HTTP session on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
History

Wed, 07 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Syrotech Sy-gpon-1110-wdont Sy-gpon-1110-wdont Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2024-08-07T18:59:05.323Z

Reserved: 2024-07-19T11:24:20.420Z

Link: CVE-2024-41687

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:52.675Z

cve-icon NVD

Status : Modified

Published: 2024-07-26T12:15:03.250

Modified: 2024-11-21T09:32:58.460

Link: CVE-2024-41687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses