Because the WAVLINK Quantum D4G (WN531G3) running...
High severity
Unreviewed
Published
Sep 14, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Sep 13, 2022
Published to the GitHub Advisory Database
Sep 14, 2022
Last updated
Jan 28, 2023
Because the WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 and earlier communicates over HTTP and not HTTPS, and because the hashing mechanism does not rely on a server-supplied key, it is possible for an attacker with sufficient network access to capture the hashed password of a logged on user and use it in a classic Pass-the-Hash style attack.
References