CVE-2019-15805

CommScope ARRIS TR4400 devices with firmware through A1.00.004-180301 are vulnerable to an authentication bypass to the administrative interface because they include the current base64 encoded password within http://192.168.1.1/login.html. Any user connected to the Wi-Fi can exploit this.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:commscope:tr4400_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:commscope:tr4400:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:05

Type Values Removed Values Added
References
  • {'url': 'https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570', 'name': 'https://medium.com/@v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570', 'tags': ['Exploit', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://medium.com/%40v.roberthoutenbrink/commscope-vulnerability-authentication-bypass-in-arris-tr4400-firmware-version-a1-00-004-180301-4a90aa8e7570 -

Information

Published : 2019-08-29 18:15

Updated : 2023-12-10 12:59


NVD link : CVE-2019-15805

Mitre link : CVE-2019-15805

CVE.ORG link : CVE-2019-15805


JSON object : View

Products Affected

commscope

  • tr4400_firmware
  • tr4400
CWE
CWE-326

Inadequate Encryption Strength