Vulnerabilites related to zyxel - p660hn-t1a_v1
cve-2017-18371
Vulnerability from cvelistv5
Published
2019-05-02 16:15
Modified
2024-08-05 21:20
Severity ?
EPSS score ?
Summary
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/fulldisclosure/2017/Jan/40 | x_refsource_MISC | |
https://ssd-disclosure.com/index.php/archives/2910 | x_refsource_MISC | |
https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/ | x_refsource_MISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | x_refsource_MISC | |
http://www.zyxel.com/support/announcement_unauthenticated.shtml | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:20:50.383Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-02T16:15:05", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-18371", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://seclists.org/fulldisclosure/2017/Jan/40", refsource: "MISC", url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { name: "https://ssd-disclosure.com/index.php/archives/2910", refsource: "MISC", url: "https://ssd-disclosure.com/index.php/archives/2910", }, { name: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", refsource: "MISC", url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { name: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", refsource: "MISC", url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-18371", datePublished: "2019-05-02T16:15:05", dateReserved: "2019-05-02T00:00:00", dateUpdated: "2024-08-05T21:20:50.383Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-18368
Vulnerability from cvelistv5
Published
2019-05-02 16:14
Modified
2025-02-04 20:52
Severity ?
EPSS score ?
Summary
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/fulldisclosure/2017/Jan/40 | x_refsource_MISC | |
https://ssd-disclosure.com/index.php/archives/2910 | x_refsource_MISC | |
https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/ | x_refsource_MISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | x_refsource_MISC | |
http://www.zyxel.com/support/announcement_unauthenticated.shtml | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:20:50.893Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, }, { other: { content: { id: "CVE-2017-18368", options: [ { Exploitation: "active", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-02-04T20:52:52.130069Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2023-08-07", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-18368", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-78", description: "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-02-04T20:52:56.909Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-02T16:14:16.000Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-18368", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://seclists.org/fulldisclosure/2017/Jan/40", refsource: "MISC", url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { name: "https://ssd-disclosure.com/index.php/archives/2910", refsource: "MISC", url: "https://ssd-disclosure.com/index.php/archives/2910", }, { name: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", refsource: "MISC", url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { name: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", refsource: "MISC", url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-18368", datePublished: "2019-05-02T16:14:16.000Z", dateReserved: "2019-05-02T00:00:00.000Z", dateUpdated: "2025-02-04T20:52:56.909Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-18372
Vulnerability from cvelistv5
Published
2019-05-02 16:15
Modified
2024-08-05 21:20
Severity ?
EPSS score ?
Summary
The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/fulldisclosure/2017/Jan/40 | x_refsource_MISC | |
https://ssd-disclosure.com/index.php/archives/2910 | x_refsource_MISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:20:50.823Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-02T16:15:22", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-18372", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://seclists.org/fulldisclosure/2017/Jan/40", refsource: "MISC", url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { name: "https://ssd-disclosure.com/index.php/archives/2910", refsource: "MISC", url: "https://ssd-disclosure.com/index.php/archives/2910", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-18372", datePublished: "2019-05-02T16:15:22", dateReserved: "2019-05-02T00:00:00", dateUpdated: "2024-08-05T21:20:50.823Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-18370
Vulnerability from cvelistv5
Published
2019-05-02 16:14
Modified
2024-08-05 21:20
Severity ?
EPSS score ?
Summary
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/fulldisclosure/2017/Jan/40 | x_refsource_MISC | |
https://ssd-disclosure.com/index.php/archives/2910 | x_refsource_MISC | |
https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/ | x_refsource_MISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | x_refsource_MISC | |
http://www.zyxel.com/support/announcement_unauthenticated.shtml | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:20:50.572Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-02T16:14:52", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-18370", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://seclists.org/fulldisclosure/2017/Jan/40", refsource: "MISC", url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { name: "https://ssd-disclosure.com/index.php/archives/2910", refsource: "MISC", url: "https://ssd-disclosure.com/index.php/archives/2910", }, { name: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", refsource: "MISC", url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { name: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", refsource: "MISC", url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-18370", datePublished: "2019-05-02T16:14:52", dateReserved: "2019-05-02T00:00:00", dateUpdated: "2024-08-05T21:20:50.572Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-18374
Vulnerability from cvelistv5
Published
2019-05-02 16:15
Modified
2024-08-05 21:20
Severity ?
EPSS score ?
Summary
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.
References
▼ | URL | Tags |
---|---|---|
https://seclists.org/fulldisclosure/2017/Jan/40 | x_refsource_MISC | |
https://ssd-disclosure.com/index.php/archives/2910 | x_refsource_MISC | |
https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/ | x_refsource_MISC | |
https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | x_refsource_MISC | |
http://www.zyxel.com/support/announcement_unauthenticated.shtml | x_refsource_MISC |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T21:20:50.379Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", "x_transferred", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2019-05-02T16:15:47", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { tags: [ "x_refsource_MISC", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { tags: [ "x_refsource_MISC", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { tags: [ "x_refsource_MISC", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { tags: [ "x_refsource_MISC", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-18374", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "https://seclists.org/fulldisclosure/2017/Jan/40", refsource: "MISC", url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { name: "https://ssd-disclosure.com/index.php/archives/2910", refsource: "MISC", url: "https://ssd-disclosure.com/index.php/archives/2910", }, { name: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", refsource: "MISC", url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { name: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", refsource: "MISC", url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { name: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", refsource: "MISC", url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-18374", datePublished: "2019-05-02T16:15:47", dateReserved: "2019-05-02T00:00:00", dateUpdated: "2024-08-05T21:20:50.379Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2019-05-02 17:29
Modified
2025-03-14 15:16
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
billion | 5200w-t_firmware | 7.3.8.0 | |
billion | 5200w-t | - | |
zyxel | p660hn-t1a_v2_firmware | 7.3.15.0 | |
zyxel | p660hn-t1a_v2 | - | |
zyxel | p660hn-t1a_v1_firmware | 7.3.15.0 | |
zyxel | p660hn-t1a_v1 | - |
{ cisaActionDue: "2023-08-28", cisaExploitAdd: "2023-08-07", cisaRequiredAction: "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", cisaVulnerabilityName: "Zyxel P660HN-T1A Routers Command Injection Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*", matchCriteriaId: "C756E02F-45B7-4F40-AEEC-DCC334023F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*", matchCriteriaId: "B8F97C92-C53D-4578-92ED-9327E3646FDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.15.0:*:*:*:*:*:*:*", matchCriteriaId: "345E3D41-AF56-47DA-9719-E84FB9DB300B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "1C6D563A-3210-4459-BE4D-5CC36CAF6784", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.15.0:*:*:*:*:*:*:*", matchCriteriaId: "BB423D04-654A-4FD5-8973-17E5B08C7453", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*", matchCriteriaId: "3AF29B50-0AE2-444C-A251-C27DEBDC064B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is accessible by an unauthenticated user. The vulnerability is in the ViewLog.asp page and can be exploited through the remote_host parameter.", }, { lang: "es", value: "El router P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 de ZyXEL distribuido por TrueOnline tiene una vulnerabilidad de inyección de comandos en la función de reenvío de registro del sistema remoto (Remote System Log forwarding), que es accesible por un usuario identificado. La vulnerabilidad está en la página ViewLog.asp y puede ser aprovechada por medio del parámetro remote_host.", }, ], id: "CVE-2017-18368", lastModified: "2025-03-14T15:16:40.000", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 10, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 10, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }, published: "2019-05-02T17:29:00.287", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, { description: [ { lang: "en", value: "CWE-78", }, ], source: "134c704f-9b21-4f2e-91b3-4a467353bcc0", type: "Secondary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-02 17:29
Modified
2024-11-21 03:19
Severity ?
Summary
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
billion | 5200w-t_firmware | 7.3.8.0 | |
billion | 5200w-t | - | |
zyxel | p660hn-t1a_v2_firmware | 7.3.37.6 | |
zyxel | p660hn-t1a_v2 | - | |
zyxel | p660hn-t1a_v1_firmware | 7.3.37.6 | |
zyxel | p660hn-t1a_v1 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*", matchCriteriaId: "C756E02F-45B7-4F40-AEEC-DCC334023F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*", matchCriteriaId: "B8F97C92-C53D-4578-92ED-9327E3646FDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.37.6:*:*:*:*:*:*:*", matchCriteriaId: "A338A056-6EC1-4CFB-A10D-1CB8D1771502", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "1C6D563A-3210-4459-BE4D-5CC36CAF6784", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.37.6:*:*:*:*:*:*:*", matchCriteriaId: "524CE722-B1A3-43F9-84D5-F63B57D6BCC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*", matchCriteriaId: "3AF29B50-0AE2-444C-A251-C27DEBDC064B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.", }, { lang: "es", value: "El router P660HN-T1A v2 TCLinux Fw # 7.3.37.6 de ZyXEL distribuido por TrueOnline, tiene tres cuentas de usuario con contraseñas por defecto, incluidas dos cuentas de servicio codificadas: una con el nombre de usuario y contraseña auténticos, y otro con el nombre de usuario supervisor y la contraseña zyad1234. Estas cuentas pueden ser usadas para iniciar sesión en la interfaz web, aprovechar inyecciones de comandos identificadas y cambiar la configuración del router para fines maliciosos.", }, ], id: "CVE-2017-18371", lastModified: "2024-11-21T03:19:57.370", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-02T17:29:01.067", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-02 17:29
Modified
2024-11-21 03:19
Severity ?
Summary
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
billion | 5200w-t_firmware | 7.3.8.0 | |
billion | 5200w-t | - | |
zyxel | p660hn-t1a_v2_firmware | 7.3.15.0 | |
zyxel | p660hn-t1a_v2 | - | |
zyxel | p660hn-t1a_v1_firmware | 7.3.15.0 | |
zyxel | p660hn-t1a_v1 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*", matchCriteriaId: "C756E02F-45B7-4F40-AEEC-DCC334023F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*", matchCriteriaId: "B8F97C92-C53D-4578-92ED-9327E3646FDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.15.0:*:*:*:*:*:*:*", matchCriteriaId: "345E3D41-AF56-47DA-9719-E84FB9DB300B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "1C6D563A-3210-4459-BE4D-5CC36CAF6784", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.15.0:*:*:*:*:*:*:*", matchCriteriaId: "BB423D04-654A-4FD5-8973-17E5B08C7453", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*", matchCriteriaId: "3AF29B50-0AE2-444C-A251-C27DEBDC064B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.", }, { lang: "es", value: "El router ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 distribuido por TrueOnline tiene dos cuentas de usuario con contraseñas predeterminadas, incluyendo una cuenta de servicio con el nombre de usuario true y password true. Estas cuentas se pueden utilizar para iniciar sesión en la interfaz web, explotar inyecciones de comandos autenticadas y cambiar la configuración del router con fines maliciosos.", }, ], id: "CVE-2017-18374", lastModified: "2024-11-21T03:19:57.837", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-02T17:29:01.490", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-798", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-02 17:29
Modified
2024-11-21 03:19
Severity ?
Summary
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
billion | 5200w-t_firmware | 7.3.8.0 | |
billion | 5200w-t | - | |
zyxel | p660hn-t1a_v2_firmware | 7.3.37.6 | |
zyxel | p660hn-t1a_v2 | - | |
zyxel | p660hn-t1a_v1_firmware | 7.3.37.6 | |
zyxel | p660hn-t1a_v1 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*", matchCriteriaId: "C756E02F-45B7-4F40-AEEC-DCC334023F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*", matchCriteriaId: "B8F97C92-C53D-4578-92ED-9327E3646FDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.37.6:*:*:*:*:*:*:*", matchCriteriaId: "A338A056-6EC1-4CFB-A10D-1CB8D1771502", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "1C6D563A-3210-4459-BE4D-5CC36CAF6784", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.37.6:*:*:*:*:*:*:*", matchCriteriaId: "524CE722-B1A3-43F9-84D5-F63B57D6BCC6", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*", matchCriteriaId: "3AF29B50-0AE2-444C-A251-C27DEBDC064B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.", }, { lang: "es", value: "El router P660HN-T1A v2 TCLinux Fw # 7.3.37.6 de ZyXEL distribuido por TrueOnline tiene una vulnerabilidad de inyección de comandos en la función de reenvío de registro del sistema remoto (Remote System Log forwarding), que solo es accesible por un usuario identificado. La vulnerabilidad está en la página logSet.asp y puede ser aprovechada por medio del parámetro ServerIP. La autorización se puede lograr mediante la función de CVE-2017-18371.", }, ], id: "CVE-2017-18370", lastModified: "2024-11-21T03:19:57.207", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-02T17:29:00.880", references: [ { source: "cve@mitre.org", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "cve@mitre.org", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", ], url: "http://www.zyxel.com/support/announcement_unauthenticated.shtml", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Technical Description", "Third Party Advisory", ], url: "https://unit42.paloaltonetworks.com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2019-05-02 17:29
Modified
2024-11-21 03:19
Severity ?
Summary
The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | Exploit, Third Party Advisory | |
cve@mitre.org | https://seclists.org/fulldisclosure/2017/Jan/40 | Exploit, Mailing List, Third Party Advisory | |
cve@mitre.org | https://ssd-disclosure.com/index.php/archives/2910 | Exploit, Technical Description, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/fulldisclosure/2017/Jan/40 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ssd-disclosure.com/index.php/archives/2910 | Exploit, Technical Description, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
billion | 5200w-t_firmware | 7.3.8.0 | |
billion | 5200w-t | - | |
zyxel | p660hn-t1a_v2_firmware | 7.3.15.0 | |
zyxel | p660hn-t1a_v2 | - | |
zyxel | p660hn-t1a_v1_firmware | 7.3.15.0 | |
zyxel | p660hn-t1a_v1 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:billion:5200w-t_firmware:7.3.8.0:*:*:*:*:*:*:*", matchCriteriaId: "C756E02F-45B7-4F40-AEEC-DCC334023F8B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:billion:5200w-t:-:*:*:*:*:*:*:*", matchCriteriaId: "B8F97C92-C53D-4578-92ED-9327E3646FDB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v2_firmware:7.3.15.0:*:*:*:*:*:*:*", matchCriteriaId: "345E3D41-AF56-47DA-9719-E84FB9DB300B", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v2:-:*:*:*:*:*:*:*", matchCriteriaId: "1C6D563A-3210-4459-BE4D-5CC36CAF6784", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:zyxel:p660hn-t1a_v1_firmware:7.3.15.0:*:*:*:*:*:*:*", matchCriteriaId: "BB423D04-654A-4FD5-8973-17E5B08C7453", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:zyxel:p660hn-t1a_v1:-:*:*:*:*:*:*:*", matchCriteriaId: "3AF29B50-0AE2-444C-A251-C27DEBDC064B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.", }, { lang: "es", value: "El router 5200W-TTCLinux Fw $ 7.3.8.0 versión 008 130603 de Billion distribuido por TrueOnline, tiene una vulnerabilidad de inyección de comandos en la función de configuración de tiempo (Time Setting), que solo es accesible por un usuario identificado. La vulnerabilidad está en la página tools_time.asp y puede ser aprovechada por medio del parámetro uiViewSNTPServer. La identificación puede ser logrado mediante la operación de CVE-2017-18373.", }, ], id: "CVE-2017-18372", lastModified: "2024-11-21T03:19:57.527", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-05-02T17:29:01.257", references: [ { source: "cve@mitre.org", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "cve@mitre.org", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Third Party Advisory", ], url: "https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Mailing List", "Third Party Advisory", ], url: "https://seclists.org/fulldisclosure/2017/Jan/40", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", "Third Party Advisory", ], url: "https://ssd-disclosure.com/index.php/archives/2910", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-78", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }