Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown

CVE-2022-34575

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing fctest.shtml.
Attacker Value
Unknown

CVE-2022-34574

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the key information of the device via accessing Tftpd32.ini.
Attacker Value
Unknown

CVE-2022-34573

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to arbitrarily configure device settings via accessing the page mb_wifibasic.shtml.
Attacker Value
Unknown

CVE-2022-34572

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the telnet password via accessing the page tftp.txt.
Attacker Value
Unknown

CVE-2022-34571

Disclosure Date: July 25, 2022 (last updated February 24, 2025)
An access control issue in Wavlink WiFi-Repeater RPTA2-77W.M4300.01.GD.2017Sep19 allows attackers to obtain the system key information and execute arbitrary commands via accessing the page syslog.shtml.
Attacker Value
Unknown

CVE-2021-28936

Disclosure Date: March 29, 2021 (last updated February 22, 2025)
The Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) Web management administrator password can be changed by sending a specially crafted HTTP GET request. The administrator username has to be known (default:admin) whereas no previous authentication is required.
Attacker Value
Unknown

CVE-2021-28937

Disclosure Date: March 29, 2021 (last updated February 22, 2025)
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
Attacker Value
Unknown

CVE-2021-28160

Disclosure Date: March 18, 2021 (last updated February 22, 2025)
Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) suffers from a reflected XSS vulnerability due to unsanitized SSID value when the latter is displayed in the /repeater.html page ("Repeater Wizard" homepage section).
Attacker Value
Unknown

CVE-2017-8771

Disclosure Date: September 20, 2017 (last updated November 26, 2024)
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root"). The attacker can make a user that is connected to the repeater click on a malicious link that will log into the telnet and will infect the device with malicious code.
0
Attacker Value
Unknown

CVE-2017-8772

Disclosure Date: September 20, 2017 (last updated November 26, 2024)
On BE126 WIFI repeater 1.0 devices, an attacker can log into telnet (which is open by default) with default credentials as root (username:"root" password:"root") and can: 1. Read the entire file system; 2. Write to the file system; or 3. Execute any code that attacker desires (malicious or not).
0