Juplink RX4-1500 Hard-coded Credential Vulnerability


Hard coded credentials exists in Juplink RX4-1500, a WiFi router. An unauthenticated attacker can exploit this vulnerability to log into the web interface or telnet service as the ‘user’ user.

Vulnerability Identifiers

Exodus Intelligence: EIP-6a41336aMITRE: CVE-2023-41030

Vulnerability Metrics

CVSSv2 Vector: AV:A/AC:L/Au:N/C:P/I:P/A:PCVSSv2 Score: 5.8

Vendor References

The affected product is end-of-life and no patches are available.

Discovery Credit

Exodus Intelligence

Disclosure Timeline

Vendor response to disclosure: July 30, 2020Disclosed to public: September 18, 2023

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at [email protected].

The post Juplink RX4-1500 Hard-coded Credential Vulnerability appeared first on Exodus Intelligence.

Support the originator by clicking the read the rest link below.