cve/2024/CVE-2024-23309.md

19 lines
911 B
Markdown
Raw Permalink Normal View History

2025-09-29 16:08:36 +00:00
### [CVE-2024-23309](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23309)
![](https://img.shields.io/static/v1?label=Product&message=WBR-6012&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=R0.40e6%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-291%3A%20Reliance%20on%20IP%20Address%20for%20Authentication&color=brightgreen)
2025-09-29 16:08:36 +00:00
### Description
The LevelOne WBR-6012 router with firmware R0.40e6 has an authentication bypass vulnerability in its web application due to reliance on client IP addresses for authentication. Attackers could spoof an IP address to gain unauthorized access without needing a session token.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2024-1996
2025-09-29 21:09:30 +02:00
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1996
2025-09-29 16:08:36 +00:00
#### Github
No PoCs found on GitHub currently.