Vonets WiFi Bridges
Vonets WiFi bridges contain multiple critical vulnerabilities affecting models VAR1200-H, VAR1200-L, VAR600-H, VAP11AC, VAP11G-500S, VBG1200, VAP11S-5G, VAP11S, VAR11N-300, VAP11G-300, VAP11N-300, VAP11G, VAP11G-500, and VGA-1000 running firmware version 3.3.23.6.9 and earlier. The vulnerabilities include hardcoded credentials (CWE-798), insufficient access control (CWE-284), path traversal (CWE-22), command injection (CWE-77), improper error handling (CWE-703), stack-based buffer overflow (CWE-121), and race conditions (CWE-425). Exploitation could allow remote attackers to execute arbitrary code, disclose sensitive information, or cause denial-of-service conditions on the affected bridge devices.
- Network access to the WiFi bridge (direct connection or reachable via IP network)
- Knowledge of hardcoded credentials or exploitation of authentication bypass vulnerabilities
- Access to bridge management interface (web UI or API) or local network to trigger command injection
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b7a921d9-d876-4cb3-8335-58eaffbd1560