ID CVE-2008-1524
Summary The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page.
References
Vulnerable Configurations
  • cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
    cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
    cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*
    cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
  • cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
    cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 11-10-2018 - 20:35)
Impact:
Exploitability:
CWE CWE-16
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bugtraq 20080301 The Router Hacking Challenge is Over!
misc
Last major update 11-10-2018 - 20:35
Published 26-03-2008 - 10:44
Last modified 11-10-2018 - 20:35
Back to Top