CVE-2024-23309

The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:level1:wbr-6012_firmware:r0.40e6:*:*:*:*:*:*:*
cpe:2.3:h:level1:wbr-6012:-:*:*:*:*:*:*:*

History

08 Nov 2024, 18:27

Type Values Removed Values Added
References () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996 - () https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996 - Exploit, Third Party Advisory
CPE cpe:2.3:h:level1:wbr-6012:-:*:*:*:*:*:*:*
cpe:2.3:o:level1:wbr-6012_firmware:r0.40e6:*:*:*:*:*:*:*
First Time Level1
Level1 wbr-6012
Level1 wbr-6012 Firmware
CVSS v2 : unknown
v3 : 9.0
v2 : unknown
v3 : 8.1

30 Oct 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-30 14:15

Updated : 2024-11-08 18:27


NVD link : CVE-2024-23309

Mitre link : CVE-2024-23309


JSON object : View

Products Affected

level1

  • wbr-6012_firmware
  • wbr-6012
CWE
CWE-291

Reliance on IP Address for Authentication