cve/2023/CVE-2023-37755.md

19 lines
966 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-37755](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37755)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
i-doit pro 25 and below and I-doit open 25 and below are configured with insecure default administrator credentials, and there is no warning or prompt to ask users to change the default password and account name. Unauthenticated attackers can exploit this vulnerability to obtain Administrator privileges, resulting in them being able to perform arbitrary system operations or cause a Denial of Service (DoS).
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/leekenghwa/CVE-2023-37755---Hardcoded-Admin-Credential-in-i-doit-Pro-25-and-below
- https://github.com/nomi-sec/PoC-in-GitHub