Vulnerabilities
Vulnerable Software
Coship:  >> Rt3052 Firmware  Security Vulnerabilities
An issue was discovered on Shenzhen Coship WM3300 WiFi Router 5.0.0.55 devices. The password reset functionality of the Wireless SSID doesn't require any type of authentication. By making a POST request to the regx/wireless/wl_security_2G.asp URI, the attacker can change the password of the Wi-FI network.
CVSS Score
9.8
EPSS Score
0.04
Published
2019-05-07
An issue was discovered on Shenzhen Coship RT3050 4.0.0.40, RT3052 4.0.0.48, RT7620 10.0.0.49, WM3300 5.0.0.54, and WM3300 5.0.0.55 devices. The password reset functionality of the router doesn't have backend validation for the current password and doesn't require any type of authentication. By making a POST request to the apply.cgi file of the router, the attacker can change the admin username and password of the router.
CVSS Score
9.8
EPSS Score
0.386
Published
2019-03-21
Coship RT3052 4.0.0.48 devices allow XSS via a crafted SSID field on the "Wireless Setting - Basic" screen.
CVSS Score
6.1
EPSS Score
0.004
Published
2018-04-10


Contact Us

Shodan ® - All rights reserved