Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2mg9-59xm-chrg

Опубликовано: 21 мая 2025
Источник: github
Github: Не прошло ревью
CVSS3: 7.7

Описание

The /etc/passwd and /etc/shadow files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).

The /etc/passwd and /etc/shadow files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).

EPSS

Процентиль: 7%
0.00026
Низкий

7.7 High

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 7.7
nvd
9 месяцев назад

The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).

EPSS

Процентиль: 7%
0.00026
Низкий

7.7 High

CVSS3

Дефекты

CWE-798