Submeter #605632: Blink BL-AC3600 V1.0.22 Exposure of Sensitive Information Through Metadatainformação

TítuloBlink BL-AC3600 V1.0.22 Exposure of Sensitive Information Through Metadata
DescriçãoThe Web management interface of the Blink router /cgi-bin/lighttpd.cgi directly returns the plaintext admin password (password field) when responding to the {"type":"geteasycfg"} request. Attackers can obtain the admin password by constructing HTTP requests and thereby fully control the device.
Fonte⚠️ https://github.com/waiwai24/0101/blob/main/CVEs/Blink/Plaintext_Password_Leakage_in_the_Web_Management_Interface_of_BL-AC3600_Routers.md
Utilizador
 waiwai24 (UID 81637)
Submissão27/06/2025 19h40 (há 10 meses)
Moderação12/07/2025 23h12 (15 days later)
EstadoAceite
Entrada VulDB316263 [LB-LINK BL-AC3600 até 1.0.22 Web Management Interface /cgi-bin/lighttpd.cgi geteasycfg Senha Divulgação de Informação]
Pontos18

Want to know what is going to be exploited?

We predict KEV entries!