9
CVSSv2

CVE-2020-29669

Published: 14/12/2020 Updated: 15/12/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

In the Macally WIFISD2-2A82 Media and Travel Router 2.000.010, the Guest user is able to reset its own password. This process has a vulnerability which can be used to take over the administrator account and results in shell access. As the admin user may read the /etc/shadow file, the password hashes of each user (including root) can be dumped. The root hash can be cracked easily which results in a complete system compromise.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

macally wifisd2-2a82_firmware 2.000.010

Exploits

Macally WIFISD2-2A82 version 2000010 guest to root privilege escalation exploit ...

Github Repositories

Macally WIFISD2

Macally WIFISD2-2A82 Writeup for CVE-2020-29669 by Maximilian Barz (Silky) and Daniel Schwendner (code-byter) This is a writeup of exploiting the Macally WIFISD2-2A82 Travel Router (Firmware version: 2000010) The Guest user is able to reset its own password This process has a vulnerability which can be used to take over the administrators account and results in shell acces