Vulnerability Description
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Twsz | Wifi Repeater Firmware | - |
| Twsz | Wifi Repeater | - |
Related Weaknesses (CWE)
References
- http://www.digitalwhisper.co.il/files/Zines/0x56/DW86-1-RepeaterHack.pdfTechnical DescriptionThird Party Advisory
- http://www.digitalwhisper.co.il/files/Zines/0x56/DW86-1-RepeaterHack.pdfTechnical DescriptionThird Party Advisory
FAQ
What is CVE-2017-8771?
CVE-2017-8771 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is ...
How severe is CVE-2017-8771?
CVE-2017-8771 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-8771?
Check the references section above for vendor advisories and patch information. Affected products include: Twsz Wifi Repeater Firmware, Twsz Wifi Repeater.