CVE-2018-20008

iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64) via the debugging console.
References
Link Resource
https://payatu.com/ibaton-routers-responsible-disclosure/ Exploit Third Party Advisory
https://www.iball.co.in/Category/Baton/283 Product Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:iball:ib-wrb302n_firmware:ib-wrb302n20122017:*:*:*:*:*:*:*
cpe:2.3:h:iball:ib-wrb302n:-:*:*:*:*:*:*:*

History

21 Jun 2021, 18:29

Type Values Removed Values Added
CPE cpe:2.3:h:iball:300m_2-port_wireless-n_broadband_router:-:*:*:*:*:*:*:*
cpe:2.3:o:iball:300m_2-port_wireless-n_broadband_router_firmware:ib-wrb302n20122017:*:*:*:*:*:*:*
cpe:2.3:h:iball:ib-wrb302n:-:*:*:*:*:*:*:*
cpe:2.3:o:iball:ib-wrb302n_firmware:ib-wrb302n20122017:*:*:*:*:*:*:*

Information

Published : 2019-05-28 21:29

Updated : 2023-12-10 12:59


NVD link : CVE-2018-20008

Mitre link : CVE-2018-20008

CVE.ORG link : CVE-2018-20008


JSON object : View

Products Affected

iball

  • ib-wrb302n_firmware
  • ib-wrb302n
CWE
CWE-312

Cleartext Storage of Sensitive Information

CWE-732

Incorrect Permission Assignment for Critical Resource