Siklu EtherHaul radios before 3.7.1 and 6.x before 6.9.0 have a built-in, hidden root account, with an unchangeable password that is the same across all devices. This account is accessible via both SSH and the device's web interface and grants access to the underlying embedded Linux OS on the device, allowing full control over it.
References
Link | Resource |
---|---|
http://blog.iancaling.com/post/145309944453 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97243 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-03-30 07:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-10308
Mitre link : CVE-2016-10308
CVE.ORG link : CVE-2016-10308
JSON object : View
Products Affected
siklu
- etherhaul_60ghz_v-band_radio
- etherhaul_70\/80ghz_gigabit_radio
- etherhaul_70\/80ghz_multi-gigabit_e-band_radio
- etherhaul_500tx
- etherhaul_firmware
- etherhaul-5500fd
- etherhaul_70ghz_e-band_radio
CWE
CWE-798
Use of Hard-coded Credentials