The captive portal in Inpiazza Cloud WiFi versions prior to v4.2.17 does not enforce limits on the number of attempts for password recovery, allowing attackers to brute force valid user accounts to gain access to login credentials.
References
Link | Resource |
---|---|
https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md | Exploit Third Party Advisory |
https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md | Exploit Third Party Advisory |
Configurations
History
09 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md - Exploit, Third Party Advisory |
09 Jun 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-307 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Inpiazza
Inpiazza cloud Wifi |
|
CPE | cpe:2.3:a:inpiazza:cloud_wifi:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md - Exploit, Third Party Advisory |
01 Jun 2023, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-01 20:15
Updated : 2025-01-09 17:15
NVD link : CVE-2023-33754
Mitre link : CVE-2023-33754
JSON object : View
Products Affected
inpiazza
- cloud_wifi
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts