CVE-2021-28150 Scanner
CVE-2021-28150 scanner - Credential Disclosure vulnerability in Hongdian H8922
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
The Hongdian H8922 3.0.5 is a popular device used for remote communication in many industries, including transportation, banking, and healthcare. This device is highly regarded for its ability to provide uninterrupted communication even in remote areas where network signal is weak. It has an easy-to-use interface with advanced features that cater to the needs of businesses and individuals alike. The Hongdian H8922 device is one of the most trusted and widely used devices in many critical communication networks.
Recently, a major vulnerability was detected in the Hongdian H8922 device. The vulnerability, known as CVE-2021-28150, enables an unprivileged guest user to read sensitive data, such as the administrator password, via /backup2.cgi. This vulnerability can put businesses using the Hongdian H8922 at major risk of data and security breaches. Hackers can exploit this vulnerability to gain access to highly sensitive information, such as bank account details, medical records, and other classified data. This puts the device and the entire network infrastructure at major risk of cyberattacks.
Exploiting the CVE-2021-28150 vulnerability can lead to major data breaches and security breaches. Hackers can use the administrator password to gain access to the entire network, compromising the sensitive data of businesses and individuals alike. This can lead to severe financial loss, reputation damage, and legal repercussions. The vulnerability can also be exploited to launch DDoS attacks, compromising the entire network and disrupting communication services.
Thanks to the pro features of the s4e.io platform, users can easily and quickly learn about vulnerabilities in their digital assets. This platform offers an all-in-one solution that provides comprehensive security assessments, vulnerability scanning, and penetration testing. With this service, businesses and individuals can identify vulnerabilities and take proactive steps to ensure the security of their networks and devices. By taking advantage of this platform, users can prevent cyberattacks and protect their sensitive data in a fast and efficient manner.
REFERENCES