Vulnerability Description
The Huawei E355 adapter with firmware 21.157.37.01.910 does not require authentication for API pages, which allows remote attackers to change passwords and settings, or obtain sensitive information, via a direct request to (1) api/wlan/security-settings, (2) api/device/information, (3) api/wlan/basic-settings, (4) api/wlan/mac-filter, (5) api/monitoring/status, or (6) api/dhcp/settings.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Huawei | E355 Firmware | 21.157.37.01.910 |
| Huawei | E355 | - |
Related Weaknesses (CWE)
References
- http://www.kb.cert.org/vuls/id/341526US Government Resource
- https://github.com/aczire/huawei-csrf-info_disclosure/blob/master/huawei_wifi_inExploit
- http://www.kb.cert.org/vuls/id/341526US Government Resource
- https://github.com/aczire/huawei-csrf-info_disclosure/blob/master/huawei_wifi_inExploit
FAQ
What is CVE-2013-6031?
CVE-2013-6031 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Huawei E355 adapter with firmware 21.157.37.01.910 does not require authentication for API pages, which allows remote attackers to change passwords and settings, or obtain sensitive information, v...
How severe is CVE-2013-6031?
CVE-2013-6031 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6031?
Check the references section above for vendor advisories and patch information. Affected products include: Huawei E355 Firmware, Huawei E355.