Acexy Wireless-N WiFi Repeater REV 1.0 - Repeater Password Disclosure
ID: CVE-2021-28937
Severity: high
Author: geeknik
Tags: cve2021,cve,acexy,disclosure,iot
Description
Section titled “Description”Acexy Wireless-N WiFi Repeater REV 1.0 is vulnerable to password disclosure because the password.html page of the web management interface contains the administrator account password in plaintext.
YAML Source
Section titled “YAML Source”id: CVE-2021-28937
info: name: Acexy Wireless-N WiFi Repeater REV 1.0 - Repeater Password Disclosure author: geeknik severity: high description: Acexy Wireless-N WiFi Repeater REV 1.0 is vulnerable to password disclosure because the password.html page of the web management interface contains the administrator account password in plaintext. impact: | An attacker can obtain the repeater's password, compromising the security of the network. remediation: | Update the firmware to the latest version or replace the vulnerable repeater with a secure alternative. reference: - https://blog-ssh3ll.medium.com/acexy-wireless-n-wifi-repeater-vulnerabilities-8bd5d14a2990 - http://acexy.com - https://nvd.nist.gov/vuln/detail/CVE-2021-28937 - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2021-28937 cwe-id: CWE-312 epss-score: 0.03261 epss-percentile: 0.91257 cpe: cpe:2.3:h:acexy:wireless-n_wifi_repeater:1.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: acexy product: wireless-n_wifi_repeater tags: cve2021,cve,acexy,disclosure,iot
http: - method: GET path: - "{{BaseURL}}/password.html"
matchers-condition: and matchers: - type: word words: - "Password Setting" - "addCfg('username'" - "addCfg('newpass'" condition: and
- type: status status: - 200# digest: 4a0a0047304502201436eb192a18ef30b69a2aa8b448dbc91484cbc12183f340f5c946666e77cf17022100be9045e44ee3fe99c45b37b11fa3dc7ed8e2cad354cdac21dfc7381413882299:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-28937.yaml"