Описание
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
Ссылки
- Third Party AdvisoryVDB Entry
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:actiontec:web6000q_firmware:1.1.02.22:*:*:*:*:*:*:*
cpe:2.3:h:actiontec:web6000q:-:*:*:*:*:*:*:*
EPSS
Процентиль: 78%
0.01156
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-662
Связанные уязвимости
github
около 3 лет назад
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
EPSS
Процентиль: 78%
0.01156
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-662