Impact
A missing authentication requirement for management frame protection allows an attacker to forge deauthentication and disassociation frames. The vulnerability is a form of authentication bypass (CWE‑306). When these frames are broadcast, the Wi‑Fi router will disconnect authorized clients without verifying the source, leading to an interruption of service. The flaw can be exploited to permanently disrupt network connectivity for any device that relies on this router. Based on the description, the attacker must be within wireless range of the target network to broadcast these frames.
Affected Systems
The affected hardware is the Jinan USR IOT Technology Limited PUSR USR‑W610 Wi‑Fi router. No specific firmware versions were supplied; the entire product line appears to be affected.
Risk and Exploitability
The CVSS score of 7.5 classifies the flaw as high severity. The EPSS score indicates a very low probability of exploitation (<1 %). The vulnerability is not listed in CISA’s KEV catalog, suggesting no known widespread exploitation. Attackers would need wireless proximity to the target network and can perform the exploit from the air without user authentication, making it a convenient and low‑barrier threat for denial of service. Based on the description, it is inferred that the attack vector is wireless proximity to the target network.
OpenCVE Enrichment