Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
References
Link | Resource |
---|---|
http://blog.iancaling.com/post/153011925478 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97242 | Third Party Advisory VDB Entry |
http://blog.iancaling.com/post/153011925478 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97242 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.iancaling.com/post/153011925478 - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/97242 - Third Party Advisory, VDB Entry |
Information
Published : 2017-03-30 07:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10307
Mitre link : CVE-2016-10307
CVE.ORG link : CVE-2016-10307
JSON object : View
Products Affected
gotrango
- giga_orion_firmware
- apex_orion
- apex_orion_firmware
- apex_lynx_firmware
- stratalink_firmware
- giga_lynx_firmware
- giga_lynx
- giga_orion
- stratalink
- apex_lynx
CWE
CWE-798
Use of Hard-coded Credentials