Описание
ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.
Ссылки
- Vendor Advisory
- Exploit
- Exploit
- Vendor Advisory
- Exploit
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:h:zyxel:prestige:645r_a1:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:650h:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:650hw:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:650hw_31:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige:650r:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:is.3:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:is.5:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05145
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.
EPSS
Процентиль: 90%
0.05145
Низкий
5 Medium
CVSS2
Дефекты
NVD-CWE-Other