This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to transmission of password in plain text. A remote attacker could exploit this vulnerability by intercepting transmission within an HTTP session on the vulnerable system.

Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-39132 This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to transmission of password in plain text. A remote attacker could exploit this vulnerability by intercepting transmission within an HTTP session on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.
Fixes

Solution

Upgrade SyroTech SY-GPON-1110-WDONT Router firmware to patched version 3.1.02-240517 http://drive.google.com/file/d/1JQc3AkJm69mV0kg2c-b-zzaojc87Rru9/view


Workaround

No workaround given by the vendor.

History

Wed, 07 Aug 2024 19:30:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2024-08-07T18:59:05.323Z

Reserved: 2024-07-19T11:24:20.420Z

Link: CVE-2024-41687

cve-icon Vulnrichment

Updated: 2024-08-02T04:46:52.675Z

cve-icon NVD

Status : Modified

Published: 2024-07-26T12:15:03.250

Modified: 2024-11-21T09:32:58.460

Link: CVE-2024-41687

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses