Vulnerability Description
Due to the lack of firmware authentication in the upgrade process of T&W WIFI Repeater BE126 devices, an attacker can craft a malicious firmware and use it as an update.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Twsz | Be126 Firmware | - |
| Twsz | Be126 | - |
Related Weaknesses (CWE)
References
- https://www.digitalwhisper.co.il/files/Zines/0x5E/DW94-3-Repeater2.pdfExploitThird Party Advisory
- https://www.digitalwhisper.co.il/files/Zines/0x5E/DW94-3-Repeater2.pdfExploitThird Party Advisory
FAQ
What is CVE-2018-9232?
CVE-2018-9232 is a vulnerability with a CVSS score of 7.8 (HIGH). Due to the lack of firmware authentication in the upgrade process of T&W WIFI Repeater BE126 devices, an attacker can craft a malicious firmware and use it as an update.
How severe is CVE-2018-9232?
CVE-2018-9232 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-9232?
Check the references section above for vendor advisories and patch information. Affected products include: Twsz Be126 Firmware, Twsz Be126.