### [CVE-2024-45275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45275) ![](https://img.shields.io/static/v1?label=Product&message=REX100&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=mbNET.mini&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=0.0.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-798%20Use%20of%20Hard-coded%20Credentials&color=brightgreen) ### Description The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices. ### POC #### Reference - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-064.txt #### Github No PoCs found on GitHub currently.