Vulnerability Description
iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64) via the debugging console.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Iball | Ib-Wrb302N Firmware | ib-wrb302n20122017 |
| Iball | Ib-Wrb302N | - |
Related Weaknesses (CWE)
References
- https://payatu.com/ibaton-routers-responsible-disclosure/ExploitThird Party Advisory
- https://www.iball.co.in/Category/Baton/283ProductVendor Advisory
- https://payatu.com/ibaton-routers-responsible-disclosure/ExploitThird Party Advisory
- https://www.iball.co.in/Category/Baton/283ProductVendor Advisory
FAQ
What is CVE-2018-20008?
CVE-2018-20008 is a vulnerability with a CVSS score of 6.8 (MEDIUM). iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64...
How severe is CVE-2018-20008?
CVE-2018-20008 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-20008?
Check the references section above for vendor advisories and patch information. Affected products include: Iball Ib-Wrb302N Firmware, Iball Ib-Wrb302N.