{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-15T11:44:37.150","vulnerabilities":[{"cve":{"id":"CVE-2018-17873","sourceIdentifier":"cve@mitre.org","published":"2018-10-23T21:30:53.567","lastModified":"2024-11-21T03:55:06.487","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect access control vulnerability in the FTP configuration of WiFiRanger devices with firmware version 7.0.8rc3 and earlier allows an attacker with adjacent network access to read the SSH Private Key and log in to the root account."},{"lang":"es","value":"Una vulnerabilidad de control de acceso incorrecto en la configuración FTP de dispositivos WiFiRanger con versiones de firmware 7.0.8rc3 y anteriores permite que un atacante con acceso de red adyacente lea la clave privada SSH e inicie sesión en la cuenta root."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0\/AV:A\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A\/AC:L\/Au:N\/C:P\/I:N\/A:N","baseScore":3.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-732"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wifiranger:wifiranger_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"7.0.8","matchCriteriaId":"E01A445C-77FF-49C1-9362-3DFF8D6654D2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wifiranger:wifiranger:-:*:*:*:*:*:*:*","matchCriteriaId":"1EF794B3-0FBD-4CD0-94F9-B78900927D2F"}]}]}],"references":[{"url":"http:\/\/packetstormsecurity.com\/files\/149867\/WiFiRanger-7.0.8rc3-Incorrect-Access-Control-Privilege-Escalation.html","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http:\/\/packetstormsecurity.com\/files\/149867\/WiFiRanger-7.0.8rc3-Incorrect-Access-Control-Privilege-Escalation.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]}]}}]}