Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35837

EPSS 0.13% · P32
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-35837

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in SolaX Pocket WiFi 3 through 3.001.02. Authentication for web interface is completed via an unauthenticated WiFi AP. The administrative password for the web interface has a default password, equal to the registration ID of the device. This same registration ID is used as the WiFi SSID name. No routine is in place to force a change to this password on first use or bring its default state to the attention of the user. Once authenticated, an attacker can reconfigure the device or upload new firmware, both of which can lead to Denial of Service, code execution, or Escalation of Privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
SolaX Pocket WiFi 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SolaX Power SolaX Pocket WiFi是SolaX Power公司的一种便携式WiFi。 SolaX Pocket WiFi 3版本至3.001.02版本存在安全漏洞,该漏洞源于攻击者可以重新配置设备或上传新固件,可能导致拒绝服务、代码执行或权限升级。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-35837

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-35837

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-01-23 · 27 CVEs total

CVE-2024-22496JFinal 跨站脚本漏洞
CVE-2023-35835SolaX Pocket WiFi 安全漏洞
CVE-2023-35836SolaX Pocket WiFi 安全漏洞
CVE-2021-42142Contiki-NG 安全漏洞
CVE-2023-36177Snapcast 安全漏洞
CVE-2023-31654RedisRaft 安全漏洞
CVE-2023-46892Meross MSH30Q 安全漏洞
CVE-2023-46889Meross MSH30Q 安全漏洞
CVE-2023-42144Shelly TRV 安全漏洞
CVE-2023-42143Shelly TRV 安全漏洞
CVE-2024-22497JFinal 跨站脚本漏洞
CVE-2023-51210Webkul Bundle SQL注入漏洞
CVE-2023-45889ClassLink 安全漏洞
CVE-2024-23848Linux kernel 安全漏洞
CVE-2024-22490beetl-bbs 跨站脚本漏洞
CVE-2024-22663TOTOLINK A3700R 安全漏洞
CVE-2024-22662TOTOLINK A3700R 安全漏洞
CVE-2024-22660TOTOLINK A3700R 安全漏洞
CVE-2024-22705Linux kernel 安全漏洞
CVE-2024-22076MyQ Solution Print Server 安全漏洞

Showing top 20 of 27 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-35837

No comments yet


Leave a comment