NPS before v0.26.10 was discovered to contain an authentication bypass vulnerability via constantly generating and sending the Auth key and Timestamp parameters.
References
Link | Resource |
---|---|
https://blog.carrot2.cn/2022/08/cve-2022-40494.html | Exploit Third Party Advisory |
https://github.com/1security/Vulnerability/blob/main/web/nps/1.md | Broken Link |
https://blog.carrot2.cn/2022/08/cve-2022-40494.html | Exploit Third Party Advisory |
https://github.com/1security/Vulnerability/blob/main/web/nps/1.md | Broken Link |
Configurations
History
17 Apr 2025, 14:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:ehang-io:nps:*:*:*:*:*:*:*:* | |
First Time |
Ehang-io
Ehang-io nps |
Information
Published : 2022-10-06 22:15
Updated : 2025-04-17 14:55
NVD link : CVE-2022-40494
Mitre link : CVE-2022-40494
CVE.ORG link : CVE-2022-40494
JSON object : View
Products Affected
ehang-io
- nps
CWE
CWE-287
Improper Authentication