POC详情: 7296452432fcdbbdbdfd13a0fb5d9797c4e2b65c

来源
关联漏洞
标题: Nepstech NTPL-XPON1GFEVN 安全漏洞 (CVE-2024-42657)
描述:Nepstech NTPL-XPON1GFEVN是Nepstech公司的一款无线路由器。 Nepstech NTPL-XPON1GFEVN v1.0版本存在安全漏洞。攻击者利用该漏洞可以获取敏感信息。
描述
CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.
介绍
# CVE-2024-42657
CVE-2024-42657 An issue in wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows a remote attacker to obtain sensitive information via the lack of encryption during login process.


CVE-2024-42657:

Summary: A vulnerability in the wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 allows an unauthenticated, remote attacker to obtain sensitive information during the login process. The issue arises due to the lack of encryption when transmitting login credentials, making it susceptible to interception via man-in-the-middle (MITM) attacks.

Details: The wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0 transmits sensitive information, including login credentials, over an unencrypted HTTP connection during the login process. This lack of encryption allows attackers who can intercept the traffic to capture and exploit the credentials. This vulnerability can lead to unauthorized access to the router's management interface and potential further exploitation of the device.

Impact: Successful exploitation of this vulnerability allows an attacker to capture sensitive information, including user credentials, potentially leading to unauthorized access and control over the router.

Affected Versions: wishnet Nepstech Wifi Router NTPL-XPON1GFEVN v1.0

Remediation: Users are advised to upgrade to a firmware version that enforces HTTPS encryption during the login process. Alternatively, users should consider deploying network-level encryption (such as VPNs) to secure their communications
文件快照

[4.0K] /data/pocs/7296452432fcdbbdbdfd13a0fb5d9797c4e2b65c └── [1.5K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。