PWS Personal Weather Station Dashboard (PWS_Dashboard) LTS December 2020 (2012_lts) allows remote code execution by injecting PHP code into settings.php. Attacks can use the PWS_printfile.php, PWS_frame_text.php, PWS_listfile.php, PWS_winter.php, and PWS_easyweathersetup.php endpoints. A contributing factor is a hardcoded login password of support, which is not documented. (This is not the same as the documented setup password, which is 12345.) The issue was fixed in late 2022.
References
| Link | Resource |
|---|---|
| https://cavefxa.com/posts/cve-2022-45291/ | Exploit Technical Description Third Party Advisory |
| https://pwsdashboard.com/ | Product |
| https://cavefxa.com/posts/cve-2022-45291/ | Exploit Technical Description Third Party Advisory |
| https://pwsdashboard.com/ | Product |
Configurations
History
No history.
Information
Published : 2023-04-25 19:15
Updated : 2025-02-04 18:15
NVD link : CVE-2022-45291
Mitre link : CVE-2022-45291
CVE.ORG link : CVE-2022-45291
JSON object : View
Products Affected
pwsdashboard
- personal_weather_station_dashboard
CWE
CWE-798
Use of Hard-coded Credentials
