Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-760: Use of a One-way Hash with a Predictable Salt. They send MQTT credentials in response to HTTP/HTTPS requests from the cloud platform. These credentials are encoded using a hardcoded string into an MD5 hash. This string could be easily calculated by an unauthorized user who spoofed sending an HTTP/HTTPS request to the devices. This could result in the affected devices being temporarily disconnected from the cloud platform and allow the user to receive MQTT commands with potentially sensitive information.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
Vulnerability Type
使用可预测Salt的单向哈希算法
Vulnerability Title
InHand Networks InRouter302 安全漏洞
Vulnerability Description
InHand Networks InRouter302是美国InHand Networks公司的一个 LTE 蜂窝路由器。 InHand Networks InRouter302 V3.5.56之前版本、InRouter615 V2.3.0.r5542之前版本存在安全漏洞,该漏洞源于使用可预测Salt的单向哈希算法。
CVSS Information
N/A
Vulnerability Type
N/A