CVE-2020-24847

Source
https://cve.org/CVERecord?id=CVE-2020-24847
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24847.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-24847
Published
2020-10-23T19:15:12.363Z
Modified
2025-11-14T10:57:29.394506Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
[none]
Details

A Cross-Site Request Forgery (CSRF) vulnerability is identified in FruityWifi through 2.4. Due to a lack of CSRF protection in pageconfigadv.php, an unauthenticated attacker can lure the victim to visit his website by social engineering or another attack vector. Due to this issue, an unauthenticated attacker can change the newSSID and hostapdwpapassphrase.

References

Affected packages

Git / github.com/xtr4nge/fruitywifi

Affected ranges

Type
GIT
Repo
https://github.com/xtr4nge/fruitywifi
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v2.*
v2.0
v2.1
v2.1.1
v2.1.2
v2.1.3
v2.2
v2.3
v2.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-24847.json"