Описание
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-0329
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90958
- http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html
- http://osvdb.org/102816
- http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html
- http://www.kb.cert.org/vuls/id/228886
- http://www.securityfocus.com/bid/65310
EPSS
CVE ID
Связанные уязвимости
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
EPSS