ID |
CVE-2008-1524
|
Summary |
The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
-
cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
|
CVSS |
Base: | 7.5 (as of 11-10-2018 - 20:35) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-16 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
refmap
via4
|
bugtraq | 20080301 The Router Hacking Challenge is Over! | misc | |
|
Last major update |
11-10-2018 - 20:35 |
Published |
26-03-2008 - 10:44 |
Last modified |
11-10-2018 - 20:35 |