CVE-2022-25213
10.03.2022, 17:47
Improper physical access control and use of hard-coded credentials in /etc/passwd permits an attacker with physical access to obtain a root shell via an unprotected UART port on the device. The same port exposes an unauthenticated Das U-Boot BIOS shell.Enginsight
Vendor | Product | Version |
---|---|---|
phicomm | k2_firmware | 𝑥 ≤ 22.5.9.163 |
phicomm | k3_firmware | 𝑥 ≤ 21.5.37.246 |
phicomm | k3c_firmware | 𝑥 ≤ 32.1.15.93 |
phicomm | k2g_firmware | 𝑥 ≤ 22.6.3.20 |
phicomm | k2p_firmware | 𝑥 ≤ 20.4.1.7 |
𝑥
= Vulnerable software versions