Vulnerability Description
An issue was discovered on Shenzhen Coship RT3050 4.0.0.40, RT3052 4.0.0.48, RT7620 10.0.0.49, WM3300 5.0.0.54, and WM3300 5.0.0.55 devices. The password reset functionality of the router doesn't have backend validation for the current password and doesn't require any type of authentication. By making a POST request to the apply.cgi file of the router, the attacker can change the admin username and password of the router.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Coship | Rt3050 Firmware | 4.0.0.40 |
| Coship | Rt3050 | - |
| Coship | Rt3052 Firmware | 4.0.0.48 |
| Coship | Rt3052 | - |
| Coship | Rt7620 Firmware | 10.0.0.49 |
| Coship | Rt7620 | - |
| Coship | Wm3300 Firmware | 5.0.0.54 |
| Coship | Wm3300 | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/151202/Coship-Wireless-Router-UnauthenticatExploitThird Party AdvisoryVDB Entry
- https://packetstormsecurity.com/files/151202/Coship-Wireless-Router-UnauthenticaExploitThird Party AdvisoryVDB Entry
- https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180ExploitThird Party Advisory
- https://www.anquanke.com/vul/id/1451446ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/46180ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/46180/ExploitThird Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/151202/Coship-Wireless-Router-UnauthenticatExploitThird Party AdvisoryVDB Entry
- https://packetstormsecurity.com/files/151202/Coship-Wireless-Router-UnauthenticaExploitThird Party AdvisoryVDB Entry
- https://vulmon.com/exploitdetails?qidtp=EDB&qid=46180ExploitThird Party Advisory
- https://www.anquanke.com/vul/id/1451446ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/46180ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/46180/ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2019-6441?
CVE-2019-6441 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An issue was discovered on Shenzhen Coship RT3050 4.0.0.40, RT3052 4.0.0.48, RT7620 10.0.0.49, WM3300 5.0.0.54, and WM3300 5.0.0.55 devices. The password reset functionality of the router doesn't have...
How severe is CVE-2019-6441?
CVE-2019-6441 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-6441?
Check the references section above for vendor advisories and patch information. Affected products include: Coship Rt3050 Firmware, Coship Rt3050, Coship Rt3052 Firmware, Coship Rt3052, Coship Rt7620 Firmware.