Описание
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitThird Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:aztech:adsl_dsl5018en_\(1t1r\)_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:aztech:adsl_dsl5018en_\(1t1r\):-:*:*:*:*:*:*:*
Конфигурация 2
Одновременно
cpe:2.3:o:aztech:dsl705e_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:aztech:dsl705e:-:*:*:*:*:*:*:*
Конфигурация 3
Одновременно
cpe:2.3:o:aztech:dsl705eu_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:aztech:dsl705eu:-:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.131
Средний
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.
EPSS
Процентиль: 94%
0.131
Средний
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-287