MoFi路由器身份验证绕过漏洞(CVE-2020-13859) CVE-2020-13859

5.0 AV AC AU C I A
发布: 2021-02-01
修订: 2024-11-21

**CVE-2020-13859 Authentication Bypass** A format error in **/etc/shadow** coupled with a logic bug in the LuCI - OpenWrt Configuration Interface framework allows the undocumented system account "mofidev" to login to the management interface without a password. The MoFi firmware has a built-in feature to assist a device owner with regaining access to the device if the root password is unknown. To accomplish this, visiting the "About" page generates a one-time password for the mofidev system account. The mofidev Linux account is defined in /etc/passwd. The one- time password displayed on this page is not the actual password. This value is used as part of the calculation which results in a 6-digit numeric password. A device owner would need to contact Mofi Network's support for further instructions on how to gain access to the "Setup Wizard". ![](https://images.seebug.org/1599209769243-w331s)Figure 2: About page I then discovered that you do not need to contact support for the...

0%
暂无可用Exp或PoC
当前有2条受影响产品信息