Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials.
Published at: October 28, 2020 at 02:15PM
View on website
Winston 1.5.4 devices make use of a Monit service (not managed during the normal user process) which is configured with default credentials.
Published at: October 28, 2020 at 02:15PM
View on website
Winston 1.5.4 devices have an SSH user account with access from bastion hosts. This is undocumented in device documents and is not announced to the user.
Published at: October 28, 2020 at 02:15PM
View on website
Winston 1.5.4 devices do not enforce authorization. This is exploitable from the intranet, and can be combined with other vulnerabilities for remote exploitation.
Published at: October 28, 2020 at 02:15PM
View on website
Winston 1.5.4 devices allow a U-Boot interrupt, resulting in local root access.
Published at: October 28, 2020 at 02:15PM
View on website
Winston 1.5.4 devices have a local www-data user that is overly permissioned, resulting in root privilege escalation.
Published at: October 28, 2020 at 02:15PM
View on website