Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a...
Critical severity
Unreviewed
Published
Jun 14, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Jun 13, 2022
Published to the GitHub Advisory Database
Jun 14, 2022
Last updated
Jan 27, 2023
Rakuten Casa version AP_F_V1_4_1 or AP_F_V2_0_0 uses a hard-coded credential which may allow a remote unauthenticated attacker to log in with the root privilege and perform an arbitrary operation.
References