{ "schema_version": "1.4.0", "id": "GHSA-cc26-r5w9-6vgv", "modified": "2021-12-04T00:01:29Z", "published": "2021-12-01T00:00:39Z", "aliases": [ "CVE-2021-43282" ], "details": "An issue was discovered on Victure WR1200 devices through 1.0.3. The default Wi-Fi WPA2 key is advertised to anyone within Wi-Fi range through the router's MAC address. The device default Wi-Fi password corresponds to the last 4 bytes of the MAC address of its 2.4 GHz network interface controller (NIC). An attacker within scanning range of the Wi-Fi network can thus scan for Wi-Fi networks to obtain the default key.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43282" }, { "type": "WEB", "url": "https://research.nccgroup.com/2021/11/12/technical-advisory-multiple-vulnerabilities-in-victure-wr1200-wifi-router-cve-2021-43282-cve-2021-43283-cve-2021-43284" }, { "type": "WEB", "url": "https://www.nccgroup.trust/us/our-research/?research=Technical+advisories" } ], "database_specific": { "cwe_ids": [ "CWE-798" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2021-11-30T19:15:00Z" } }