{ "schema_version": "1.4.0", "id": "GHSA-h4fp-2jq4-jm9w", "modified": "2025-04-20T03:45:24Z", "published": "2022-05-13T01:43:21Z", "aliases": [ "CVE-2017-14243" ], "details": "An authentication bypass vulnerability on UTStar WA3002G4 ADSL Broadband Modem WA3002G4-0021.01 devices allows attackers to directly access administrative settings and obtain cleartext credentials from HTML source, as demonstrated by info.cgi, upload.cgi, backupsettings.cgi, pppoe.cgi, resetrouter.cgi, and password.cgi.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-14243" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/42739" }, { "type": "WEB", "url": "https://www.techipick.com/iball-baton-adsl2-home-router-utstar-wa3002g4-adsl-broadband-modem-authentication-bypass" } ], "database_specific": { "cwe_ids": [ "CWE-287" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-09-17T19:29:00Z" } }