Описание
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
Ссылки
- ExploitThird Party Advisory
- Vendor Advisory
- Broken LinkVendor Advisory
- ExploitThird Party Advisory
- Vendor Advisory
- Broken LinkVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.01.097 (включая)
Одновременно
cpe:2.3:o:askey:ap5100w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:askey:ap5100w:-:*:*:*:*:*:*:*
EPSS
Процентиль: 71%
0.00659
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-521
Связанные уязвимости
CVSS3: 9.8
github
больше 3 лет назад
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
EPSS
Процентиль: 71%
0.00659
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-521