Vulnerability Description
Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Grandstream | Gwn7610 Firmware | < 1.0.8.18 |
| Grandstream | Gwn7610 | - |
| Grandstream | Gwn7000 Firmware | < 1.0.6.32 |
| Grandstream | Gwn7000 | - |
Related Weaknesses (CWE)
References
- https://github.com/scarvell/grandstream_exploitsNot Applicable
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesThird Party Advisory
- https://github.com/scarvell/grandstream_exploitsNot Applicable
- https://www.trustwave.com/en-us/resources/security-resources/security-advisoriesThird Party Advisory
FAQ
What is CVE-2019-10657?
CVE-2019-10657 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Grandstream GWN7000 before 1.0.6.32 and GWN7610 before 1.0.8.18 devices allow remote authenticated users to discover passwords via a /ubus/uci.apply config request.
How severe is CVE-2019-10657?
CVE-2019-10657 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10657?
Check the references section above for vendor advisories and patch information. Affected products include: Grandstream Gwn7610 Firmware, Grandstream Gwn7610, Grandstream Gwn7000 Firmware, Grandstream Gwn7000.