Описание
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI).
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до rp2613 (включая)
Одновременно
cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*
EPSS
Процентиль: 23%
0.00075
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
CVSS3: 7.5
github
больше 3 лет назад
An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach the telnet server (used for the CLI).
EPSS
Процентиль: 23%
0.00075
Низкий
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
NVD-CWE-Other