Vulnerability Description
An authentication bypass vulnerability on UTStar WA3002G4 ADSL Broadband Modem WA3002G4-0021.01 devices allows attackers to directly access administrative settings and obtain cleartext credentials from HTML source, as demonstrated by info.cgi, upload.cgi, backupsettings.cgi, pppoe.cgi, resetrouter.cgi, and password.cgi.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Utstar | Wa3002G4 Firmware | wa3002g4-0021.01 |
| Utstar | Wa3002G4 | - |
Related Weaknesses (CWE)
References
- https://www.exploit-db.com/exploits/42739/Third Party AdvisoryVDB Entry
- https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broThird Party Advisory
- https://www.exploit-db.com/exploits/42739/Third Party AdvisoryVDB Entry
- https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broThird Party Advisory
FAQ
What is CVE-2017-14243?
CVE-2017-14243 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An authentication bypass vulnerability on UTStar WA3002G4 ADSL Broadband Modem WA3002G4-0021.01 devices allows attackers to directly access administrative settings and obtain cleartext credentials fro...
How severe is CVE-2017-14243?
CVE-2017-14243 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-14243?
Check the references section above for vendor advisories and patch information. Affected products include: Utstar Wa3002G4 Firmware, Utstar Wa3002G4.