Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2023-40707
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Weak password requirements in OPTO 22 SNAP PAC S1 Built-in Web Server
Source: NVD (National Vulnerability Database)
Vulnerability Description
There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
弱口令要求
Source: NVD (National Vulnerability Database)
Vulnerability Title
OPTO 22 SNAP PAC S1 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
OPTO 22 SNAP PAC S1是美国OPTO 22公司的一种控制器。 ​OPTO 22 SNAP PAC S1 R10.3b 固件版本存在安全漏洞,该漏洞源于内置的 Web 服务器身份验证尝试限制不当,不强制要求设置复杂的密码,如果用户不设置复杂的密码,则可能会导致暴力破解。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
OPTO 22SNAP PAC S1 R10.3b -
II. Public POCs for CVE-2023-40707
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2023-40707
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2023-40707

No comments yet


Leave a comment