Описание
ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:zyxel:pk5001z_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:pk5001z:-:*:*:*:*:*:*:*
EPSS
Процентиль: 97%
0.3596
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-255
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
EPSS
Процентиль: 97%
0.3596
Средний
8.8 High
CVSS3
9 Critical
CVSS2
Дефекты
CWE-255