CVE-2019-12941

AutoPi Wi-Fi/NB and 4G/LTE devices before 2019-10-15 allows an attacker to perform a brute-force attack or dictionary attack to gain access to the WiFi network, which provides root access to the device. The default WiFi password and WiFi SSID are derived from the same hash function output (input is only 8 characters), which allows an attacker to deduce the WiFi password from the WiFi SSID.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:autopi:wi-fi\/nb_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:autopi:wi-fi\/nb:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:autopi:4g\/lte_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:autopi:4g\/lte:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
References
  • {'url': 'https://www.kth.se/polopoly_fs/1.931922.1571071632!/Burdzovic_Matsson_dongle_v2.pdf', 'name': 'https://www.kth.se/polopoly_fs/1.931922.1571071632!/Burdzovic_Matsson_dongle_v2.pdf', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://www.kth.se/polopoly_fs/1.931922.1571071632%21/Burdzovic_Matsson_dongle_v2.pdf -

Information

Published : 2019-10-14 18:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-12941

Mitre link : CVE-2019-12941

CVE.ORG link : CVE-2019-12941


JSON object : View

Products Affected

autopi

  • 4g\/lte
  • 4g\/lte_firmware
  • wi-fi\/nb
  • wi-fi\/nb_firmware
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts