TROYANOSYVIRUS
Retour aux CVEs

CVE-2023-33621

MEDIUM
5.9

Description

GL.iNET GL-AR750S-Ext firmware v3.215 inserts the admin authentication token into a GET request when the OpenVPN Server config file is downloaded. The token is then left in the browser history or access logs, potentially allowing attackers to bypass authentication via session replay.

Details CVE

Score CVSS v3.15.9
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisNONE
Interaction utilisateurNONE
Publie6/13/2023
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

gl-inet:gl-ar750sgl-inet:gl-ar750s_firmware

Faiblesses (CWE)

CWE-294

References

http://glinet.com(cve@mitre.org)
http://gl-ar750s-ext.com(af854a3a-2127-422b-91ae-364da2661108)
http://glinet.com(af854a3a-2127-422b-91ae-364da2661108)
https://justinapplegate.me/2023/glinet-CVE-2023-33621/(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.