ID

VAR-201311-0241


CVE

CVE-2013-6918


TITLE

Satechi Smart Travel Router Web Management Console Remote Authentication Bypass Vulnerability

Trust: 0.9

sources: CNVD: CNVD-2013-14852 // BID: 64030

DESCRIPTION

The web interface on the Satechi travel router 1.5, when Wi-Fi is used for WAN access, exposes the console without authentication on the WAN IP address regardless of the "Web Management via WAN" setting, which allows remote attackers to bypass intended access restrictions via HTTP requests. The Satechi Smart Travel Router is a wireless router device. A remote attacker can bypass the access restriction control device by submitting an HTTP request. Satechi Travel Router is a portable router product of American Satechi Company that includes standard international plug adapters, USB chargers and WiFi (802.11b/g/n) routers

Trust: 2.61

sources: NVD: CVE-2013-6918 // JVNDB: JVNDB-2013-005332 // CNVD: CNVD-2013-14852 // BID: 64030 // VULHUB: VHN-66920 // VULMON: CVE-2013-6918

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-14852

AFFECTED PRODUCTS

vendor:satechimodel:smart travel routerscope:eqversion:1.5

Trust: 3.0

sources: CNVD: CNVD-2013-14852 // JVNDB: JVNDB-2013-005332 // CNNVD: CNNVD-201311-480 // NVD: CVE-2013-6918

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-6918
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-6918
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-14852
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201311-480
value: MEDIUM

Trust: 0.6

VULHUB: VHN-66920
value: MEDIUM

Trust: 0.1

VULMON: CVE-2013-6918
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2013-6918
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2013-14852
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-66920
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2013-14852 // VULHUB: VHN-66920 // VULMON: CVE-2013-6918 // JVNDB: JVNDB-2013-005332 // CNNVD: CNNVD-201311-480 // NVD: CVE-2013-6918

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-66920 // JVNDB: JVNDB-2013-005332 // NVD: CVE-2013-6918

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201311-480

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201311-480

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-005332

PATCH

title:Satechi Smart Travel Routerurl:http://www.satechi.net/index.php/satechi-smart-travel-router

Trust: 0.8

sources: JVNDB: JVNDB-2013-005332

EXTERNAL IDS

db:NVDid:CVE-2013-6918

Trust: 3.5

db:BIDid:64030

Trust: 1.1

db:JVNDBid:JVNDB-2013-005332

Trust: 0.8

db:CNNVDid:CNNVD-201311-480

Trust: 0.7

db:CNVDid:CNVD-2013-14852

Trust: 0.6

db:BUGTRAQid:20131122 UNAUTHORIZED CONSOLE ACCESS ON SATECHI TRAVEL ROUTER V1.5

Trust: 0.6

db:VULHUBid:VHN-66920

Trust: 0.1

db:VULMONid:CVE-2013-6918

Trust: 0.1

sources: CNVD: CNVD-2013-14852 // VULHUB: VHN-66920 // VULMON: CVE-2013-6918 // BID: 64030 // JVNDB: JVNDB-2013-005332 // CNNVD: CNNVD-201311-480 // NVD: CVE-2013-6918

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2013-11/0123.html

Trust: 3.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6918

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6918

Trust: 0.8

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.securityfocus.com/bid/64030

Trust: 0.1

sources: CNVD: CNVD-2013-14852 // VULHUB: VHN-66920 // VULMON: CVE-2013-6918 // JVNDB: JVNDB-2013-005332 // CNNVD: CNNVD-201311-480 // NVD: CVE-2013-6918

CREDITS

Luc Dore

Trust: 0.3

sources: BID: 64030

SOURCES

db:CNVDid:CNVD-2013-14852
db:VULHUBid:VHN-66920
db:VULMONid:CVE-2013-6918
db:BIDid:64030
db:JVNDBid:JVNDB-2013-005332
db:CNNVDid:CNNVD-201311-480
db:NVDid:CVE-2013-6918

LAST UPDATE DATE

2025-04-11T23:10:35.165000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-14852date:2013-12-04T00:00:00
db:VULHUBid:VHN-66920date:2014-03-05T00:00:00
db:VULMONid:CVE-2013-6918date:2014-03-05T00:00:00
db:BIDid:64030date:2013-12-02T00:00:00
db:JVNDBid:JVNDB-2013-005332date:2013-12-03T00:00:00
db:CNNVDid:CNNVD-201311-480date:2013-12-06T00:00:00
db:NVDid:CVE-2013-6918date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-14852date:2013-12-04T00:00:00
db:VULHUBid:VHN-66920date:2013-11-30T00:00:00
db:VULMONid:CVE-2013-6918date:2013-11-30T00:00:00
db:BIDid:64030date:2013-12-02T00:00:00
db:JVNDBid:JVNDB-2013-005332date:2013-12-03T00:00:00
db:CNNVDid:CNNVD-201311-480date:2013-11-30T00:00:00
db:NVDid:CVE-2013-6918date:2013-11-30T11:43:54.663