Vulnerability Description
The Humax Wi-Fi Router model HG100R-* 2.0.6 is prone to an authentication bypass vulnerability via specially crafted requests to the management console. The bug is exploitable remotely when the router is configured to expose the management console. The router is not validating the session token while returning answers for some methods in url '/api'. An attacker can use this vulnerability to retrieve sensitive information such as private/public IP addresses, SSID names, and passwords.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Humaxdigital | Hg100R Firmware | 2.0.6 |
| Humaxdigital | Hg100R | - |
Related Weaknesses (CWE)
References
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-VulnBroken Link
- https://hackertor.com/2017/07/19/na-cve-2017-11435-the-humax-wi-fi-router-model-Third Party AdvisoryVDB Entry
- https://www.trustwave.com/Resources/Security-Advisories/Advisories/Multiple-VulnBroken Link
FAQ
What is CVE-2017-11435?
CVE-2017-11435 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Humax Wi-Fi Router model HG100R-* 2.0.6 is prone to an authentication bypass vulnerability via specially crafted requests to the management console. The bug is exploitable remotely when the router...
How severe is CVE-2017-11435?
CVE-2017-11435 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-11435?
Check the references section above for vendor advisories and patch information. Affected products include: Humaxdigital Hg100R Firmware, Humaxdigital Hg100R.