Loading
Contec FXA3200 version 1.13 and under were discovered to contain a hard coded hash password for root stored in the component /etc/shadow. As the password strength is weak, it can be cracked in few minutes. Through this credential, a malicious actor can access the Wireless LAN Manager interface and open the telnet port then sniff the traffic or inject any malware.
Use CWE-798, Contec vendor hub and Fxa3000 Firmware product page to widen CVE-2022-36159 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-36158 for nearby disclosures in the same product family.