Lucene search

K
vulnrichmentCERTVDEVULNRICHMENT:CVE-2023-1083
HistoryApr 09, 2024 - 8:25 a.m.

CVE-2023-1083 Welotec: improper access control in TK500v1 router series

2024-04-0908:25:46
CWE-306
CERTVDE
github.com
2
cve-2023-1083; welotec tk500v1 router; improper access control; remote attacker; mqtt; configuration commands; reboot commands; firmware updates

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

An unauthenticated remote attacker who is aware of a MQTT topic name can send and receive messages, including GET/SET configuration commands, reboot commands and firmware updates.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:h:welotec:tk515l:*:*:*:*:*:*:*:*"
    ],
    "vendor": "welotec",
    "product": "tk515l",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.3.0.r5542",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:welotec:tk525l:*:*:*:*:*:*:*:*"
    ],
    "vendor": "welotec",
    "product": "tk525l",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.3.0.r5542",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:welotec:tk525u:*:*:*:*:*:*:*:*"
    ],
    "vendor": "welotec",
    "product": "tk525u",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.3.0.r5542",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:welotec:tk525w:*:*:*:*:*:*:*:*"
    ],
    "vendor": "welotec",
    "product": "tk525w",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.3.0.r5542",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:h:welotec:tk535l1:*:*:*:*:*:*:*:*"
    ],
    "vendor": "welotec",
    "product": "tk535l1",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "lessThan": "2.3.0.r5542",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2023-1083