漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
N/A
Vulnerability Description
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-760: Use of a One-way Hash with a Predictable Salt. They send MQTT credentials in response to HTTP/HTTPS requests from the cloud platform. These credentials are encoded using a hardcoded string into an MD5 hash. This string could be easily calculated by an unauthorized user who spoofed sending an HTTP/HTTPS request to the devices. This could result in the affected devices being temporarily disconnected from the cloud platform and allow the user to receive MQTT commands with potentially sensitive information.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
Vulnerability Type
使用可预测Salt的单向哈希算法
Vulnerability Title
InHand Networks InRouter302 安全漏洞
Vulnerability Description
InHand Networks InRouter302是美国InHand Networks公司的一个 LTE 蜂窝路由器。 InHand Networks InRouter302 V3.5.56之前版本、InRouter615 V2.3.0.r5542之前版本存在安全漏洞,该漏洞源于使用可预测Salt的单向哈希算法。
CVSS Information
N/A
Vulnerability Type
N/A