CVE-2019-6441
CRITICALCoship Rt3050 Firmware - Authentication Bypass
Title source: ruleDescription
An issue was discovered on Shenzhen Coship RT3050 4.0.0.40, RT3052 4.0.0.48, RT7620 10.0.0.49, WM3300 5.0.0.54, and WM3300 5.0.0.55 devices. The password reset functionality of the router doesn't have backend validation for the current password and doesn't require any type of authentication. By making a POST request to the apply.cgi file of the router, the attacker can change the admin username and password of the router.
Exploits (1)
exploitdb
WORKING POC
by Adithyan AK · htmlwebappshardware
https://www.exploit-db.com/exploits/46180
References (6)
Scores
CVSS v3
9.8
EPSS
0.4956
EPSS Percentile
97.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-287
Status
published
Products (5)
coship/rt3050_firmware
4.0.0.40
coship/rt3052_firmware
4.0.0.48
coship/rt7620_firmware
10.0.0.49
coship/wm3300_firmware
5.0.0.54
coship/wm3300_firmware
5.0.0.55
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026