Vulnerability Description
IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to access sensitive information via the checkLoginUser, ate, telnet, version, setDebugCfg, and boot interfaces.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ip-Com | Ew9 Firmware | 15.11.0.14 |
| Ip-Com | Ew9 | - |
References
- https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/4_inforExploitThird Party Advisory
- https://github.com/splashsc/IOT_Vulnerability_Discovery/blob/main/ip-com/4_inforExploitThird Party Advisory
FAQ
What is CVE-2022-43366?
CVE-2022-43366 is a vulnerability with a CVSS score of 7.5 (HIGH). IP-COM EW9 V15.11.0.14(9732) allows unauthenticated attackers to access sensitive information via the checkLoginUser, ate, telnet, version, setDebugCfg, and boot interfaces.
How severe is CVE-2022-43366?
CVE-2022-43366 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-43366?
Check the references section above for vendor advisories and patch information. Affected products include: Ip-Com Ew9 Firmware, Ip-Com Ew9.