Enviar #582868: NuCom NC-WR744G 8.5.5 (Build:20200530.307-TEMP) Cleartext Storage of Sensitive Informationinformación

TítuloNuCom NC-WR744G 8.5.5 (Build:20200530.307-TEMP) Cleartext Storage of Sensitive Information
DescripciónIt's possible to obtain valid hardcoded credentials from the client-side code, right after the web page login. Those credentials give access to Telnet, FTP and SMB services running on the product and also other credentials related to the web application. Steps to reproduce: Step 1: Go to the product's console application login form accessing http://<IP>:<PORT>; Step 2: After successfull login, view the client-side code using the browser dev-tools; Step 3: Search for the "account" tag and then locate the following credentials: "CMCCAdmin", "useradmin" and "CUAdmin" for other web features access and Admin:cxx4dm1n5591 for Telnet, FTP and SAMBA (all valid access)
Usuario
 matuii (UID 85610)
Sumisión2025-05-22 05:41 (hace 11 meses)
Moderación2025-05-30 13:34 (8 days later)
EstadoAceptado
Entrada de VulDB310672 [NuCom NC-WR744G 8.5.5 Build 20200530.307 Console Application CMCCAdmin/useradmin/CUAdmin autenticación débil]
Puntos17

Want to know what is going to be exploited?

We predict KEV entries!