Description
iBall Baton iB-WRB302N20122017 devices have improper access control over the UART interface, allowing physical attackers to discover Wi-Fi credentials (plain text) and the web-console password (base64) via the debugging console.
References (2)
Core 2
Core References
Product, Vendor Advisory x_refsource_misc
https://www.iball.co.in/Category/Baton/283
Exploit, Third Party Advisory x_refsource_misc
https://payatu.com/ibaton-routers-responsible-disclosure/
Scores
CVSS v3
6.8
EPSS
0.0003
EPSS Percentile
9.5%
Attack Vector
PHYSICAL
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-312
CWE-732
Status
published
Products (1)
iball/ib-wrb302n_firmware
ib-wrb302n20122017
Published
May 28, 2019
Tracked Since
Feb 18, 2026