An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. An attacker within RF range can obtain a cleartext copy of the network configuration of the device, including the Wi-Fi PSK, during device setup and reconfiguration. Upon success, the attacker is able to further infiltrate the target's Wi-Fi networks.
References
Link | Resource |
---|---|
https://www.solaxpower.com/downloads/ | Not Applicable |
https://www.solaxpower.com/help/upgrading-the-pocket-wifi-firmware/ | Product |
https://yougottahackthat.com/blog/ | Third Party Advisory |
https://yougottahackthat.com/blog/1370/solax-inverters-pocket-wifi-using-poor-authentication | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2024-01-23 23:15
Updated : 2024-01-31 18:38
NVD link : CVE-2023-35836
Mitre link : CVE-2023-35836
CVE.ORG link : CVE-2023-35836
JSON object : View
Products Affected
solax
- pocket_wifi_3
- pocket_wifi_3_firmware
CWE