Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
                
            References
                    | Link | Resource | 
|---|---|
| https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 | Broken Link Third Party Advisory | 
| https://jvn.jp/en/vu/JVNVU98305100/ | Patch Third Party Advisory | 
| https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo | Exploit Mitigation Third Party Advisory | 
| https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section | Product | 
| https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 | Broken Link Third Party Advisory | 
| https://jvn.jp/en/vu/JVNVU98305100/ | Patch Third Party Advisory | 
| https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo | Exploit Mitigation Third Party Advisory | 
| https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section | Product | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
| AND | 
            
            
 
  | 
    
Configuration 4 (hide)
| AND | 
            
            
 
  | 
    
History
                    21 Nov 2024, 07:12
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://gist.github.com/Nwqda/aac33d1936d2b514a3268f145345abb4 - Broken Link, Third Party Advisory | |
| References | () https://jvn.jp/en/vu/JVNVU98305100/ - Patch, Third Party Advisory | |
| References | () https://samy.link/blog/contec-flexlan-fxa2000-and-fxa3000-series-vulnerability-repo - Exploit, Mitigation, Third Party Advisory | |
| References | () https://www.contec.com/products-services/computer-networking/flexlan-fx/fx-accesspoint/fxa3200/feature/#section - Product | 
Information
                Published : 2022-09-26 11:15
Updated : 2025-05-21 18:15
NVD link : CVE-2022-36159
Mitre link : CVE-2022-36159
CVE.ORG link : CVE-2022-36159
JSON object : View
Products Affected
                contec
- fxa3200
 - fxa2000_firmware
 - fxa3020_firmware
 - fxa2000
 - fxa3000
 - fxa3020
 - fxa3000_firmware
 - fxa3200_firmware
 
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
