Vulnerability Description
A vulnerability was found in Uniway UW-302VP 2.0. It has been rated as problematic. This issue affects some unknown processing of the file /boaform/wlan_basic_set.cgi of the component Admin Web Interface. The manipulation of the argument wlanssid/password leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248939. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Uniwayinfo | Uw-302Vp Firmware | 2.0 |
| Uniwayinfo | Uw-302Vp | - |
Related Weaknesses (CWE)
References
- https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/viewExploitThird Party Advisory
- https://vuldb.com/?ctiid.248939Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.248939Permissions RequiredThird Party AdvisoryVDB Entry
- https://drive.google.com/file/d/15Wr3EL4cpAS_H_Vp7TuIftssxAuzb4SL/viewExploitThird Party Advisory
- https://vuldb.com/?ctiid.248939Permissions RequiredThird Party AdvisoryVDB Entry
- https://vuldb.com/?id.248939Permissions RequiredThird Party AdvisoryVDB Entry
FAQ
What is CVE-2023-7092?
CVE-2023-7092 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A vulnerability was found in Uniway UW-302VP 2.0. It has been rated as problematic. This issue affects some unknown processing of the file /boaform/wlan_basic_set.cgi of the component Admin Web Interf...
How severe is CVE-2023-7092?
CVE-2023-7092 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-7092?
Check the references section above for vendor advisories and patch information. Affected products include: Uniwayinfo Uw-302Vp Firmware, Uniwayinfo Uw-302Vp.