Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2022-34572
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.001
EPSS Ranking
26.7%
CVSS Severity
CVSS v3 Score
5.7
References
https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md
https://www.wavlink.com/en_us/category/REPEATER.html
https://github.com/pghuanghui/CVE_Request/blob/main/WiFi-Repeater/WiFi-Repeater_syslog.shtml.assets/WiFi-Repeater_tftp.md
https://www.wavlink.com/en_us/category/REPEATER.html
Products affected by CVE-2022-34572
Wavlink
»
Wifi-Repeater Firmware
»
Version:
rpta2-77w.m4300.01.gd.2017sep19
cpe:2.3:o:wavlink:wifi-repeater_firmware:rpta2-77w.m4300.01.gd.2017sep19
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved