Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A null byte interaction error has been discovered in the code that the telnetd_startup daemon uses to construct a pair of ephemeral passwords that allow a user to spawn a telnet service on the router, and to ensure that the telnet service persists upon reboot. By means of a crafted exchange of UDP packets, an unauthenticated attacker on the local network can leverage this null byte interaction error in such a way as to make those ephemeral passwords predictable (with 1-in-94 odds). Since the attacker must manipulate data processed by the OpenSSL function RSA_public_decrypt(), successful exploitation of this vulnerability depends on the use of an unpadded RSA cipher (CVE-2022-25218).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Phicomm 多款产品安全漏洞
Vulnerability Description
Phicomm PHICOMM K2等都是中国斐讯(Phicomm)公司的产品。PHICOMM K2是一款无线路由器。PHICOMM K3等都是中国斐讯(PHICOMM)公司的产品。PHICOMM K3是一个双频千兆无线 WiFi 路由器。PHICOMM K3C是一个双频千兆无线 WiFi 路由器。PHICOMM K2 A7是一个双频千兆无线 WiFi 路由器。PHICOMM K2G A1是一个双频千兆无线 WiFi 路由器。 Phicomm 多款产品存在安全漏洞,本地网络上的远程攻击者可以使用特别制作的
CVSS Information
N/A
Vulnerability Type
N/A