Vulnerabilities
Vulnerable Software
Twsz:  >> Wifi Repeater  Security Vulnerabilities
There is LFD (local file disclosure) on BE126 WIFI repeater 1.0 devices that allows attackers to read the entire filesystem on the device via a crafted getpage parameter.
CVSS Score
7.5
EPSS Score
0.218
Published
2017-09-20
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
CVSS Score
9.8
EPSS Score
0.004
Published
2017-09-20
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1. Read the entire file system; 2. Write to the file system; or 3. Execute any code that attacker desires (malicious or not).
CVSS Score
9.8
EPSS Score
0.003
Published
2017-09-20
T&W WIFI Repeater BE126 allows remote authenticated users to execute arbitrary code via shell metacharacters in the user parameter to cgi-bin/webupg.
CVSS Score
8.8
EPSS Score
0.036
Published
2017-09-07


Contact Us

Shodan ® - All rights reserved