Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9j87-wr37-cwg6

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.8

Описание

The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor.

The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor.

EPSS

Процентиль: 13%
0.00043
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 6.8
nvd
почти 8 лет назад

The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor.

CVSS3: 9.8
fstec
почти 8 лет назад

Уязвимость микропрограммного обеспечения маршрутизатора Zyxel Multy X AC3000, связанная с отсутствием защиты UART позволяющая нарушителю получить доступ к устройству с привилегиями root

EPSS

Процентиль: 13%
0.00043
Низкий

6.8 Medium

CVSS3

Дефекты

CWE-798