CVE-2013-6918
Published Nov 30, 2013
Last updated 11 years ago
Overview
- Description
- The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 4.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:satechi:smart_travel_router:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59AFAA8A-4A13-46A7-AB6F-42FA24DC4F0D" } ], "operator": "OR" } ] } ]