** UNSUPPORTED WHEN ASSIGNED ** An improper restriction of excessive authentication attempts vulnerability in the web management interface of Zyxel…
This vulnerability allows an adjacent attacker on the LAN to brute-force the password and bypass authentication in the web management interface of Zyxel WRE6505 v2 firmware. This can cause unauthorized access to the device and potentially lead to further exploitation. The vulnerability is caused by inadequate restriction of excessive authentication attempts.
** UNSUPPORTED WHEN ASSIGNED ** An improper restriction of excessive authentication attempts vulnerability in the web management interface of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to brute-force the password and bypass authentication.
Adjacent attackers on the LAN are at risk of bypassing authentication and gaining unauthorized access to the Zyxel WRE6505 v2 device due to inadequate restriction of excessive authentication attempts.
Monitor & Review
Low severity — keep this CVE on your radar and patch during routine maintenance.
What should I do?
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
0
Affected Products
1
References
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitability
Impact