Vulnerability Description
On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get an administrative shell. These credentials are reset to defaults with every reboot.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oringnet | Iap-420\+ Firmware | 2.0m |
| Oringnet | Iap-420\+ | - |
| Oringnet | Iap-420 Firmware | 2.0m |
| Oringnet | Iap-420 | - |
Related Weaknesses (CWE)
References
- https://mads.uniud.it/2022/09/lord-of-the-orings/ExploitMitigationThird Party Advisory
- https://mads.uniud.it/2022/09/lord-of-the-orings/ExploitMitigationThird Party Advisory
FAQ
What is CVE-2022-3203?
CVE-2022-3203 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On ORing net IAP-420(+) with FW version 2.0m a telnet server is enabled by default and cannot permanently be disabled. You can connect to the device via LAN or WiFi with hardcoded credentials and get ...
How severe is CVE-2022-3203?
CVE-2022-3203 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-3203?
Check the references section above for vendor advisories and patch information. Affected products include: Oringnet Iap-420\+ Firmware, Oringnet Iap-420\+, Oringnet Iap-420 Firmware, Oringnet Iap-420.