Improper Access Control (no control at all) in KAON CG3000 router — CVE-2021–43483

--

Edit: This vulnerability was registered with the CVE-2021–43483

The router model KAON CG3000, running the software version 1.00.67, customized and widely distributed by the CLARO company in Brazil, has no access control in reading or updating the device configuration.

Being connected to the same network, is possible to access, without any kind of authentication, the wifi configuration through the following endpoints:

  • http://<router-ip>/section/wlswitchint1wi-fi-rede-principal.wl
  • http://<router-ip>/section/wlswitchint0wi-fi-rede-principal.wl

Also, the POST request used to change the wifi configuration is allowed without authentication. Here follows a POST request which can update the wifi SSID, password, visibility and other configurations:

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Responses (1)

Write a response