CVE-2024-6788
moderate-risk
Published 2024-08-13
A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.
Do I need to act?
~
4.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.6/10
High
NETWORK
/ LOW complexity
Affected Products (4)
Affected Vendors
References (1)
Third Party Advisory
https://cert.vde.com/en/advisories/VDE-2024-022
47
/ 100
moderate-risk
Severity
29/34 · Critical
Exploitability
8/34 · Low
Exposure
10/34 · Low