CVE-2019-19254

Current Description

Intelbras WRN240 devices do not require authentication to replace the firmware via a POST request to the incoming/Firmware.cfg URI.

Basic Data

PublishedJanuary 17, 2020
Last ModifiedMarch 02, 2020
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCVE-2012-0057
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSIntelbrasWrn 240 Firmware2.0.0*******
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3HardwareIntelbrasWrn 240-*******

Vulnerable Software List

VendorProductVersions
Intelbras Wrn 240 Firmware 2.0.0

References

NameSourceURLTags
http://packetstormsecurity.com/files/156589/Intelbras-Wireless-N-150Mbps-WRN240-Authentication-Bypass.htmlhttp://packetstormsecurity.com/files/156589/Intelbras-Wireless-N-150Mbps-WRN240-Authentication-BypasMISC
https://fireshellsecurity.team/hack-n-routers/https://fireshellsecurity.team/hack-n-routers/MISCExploit Third Party Advisory