CVE-2016-10372

The Eir D1000 modem does not properly restrict the TR-064 protocol, which allows remote attackers to execute arbitrary commands via TCP port 7547, as demonstrated by opening WAN access to TCP port 80, retrieving the login password (which defaults to the Wi-Fi password), and using the NewNTPServer feature.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:eir:d1000_modem_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:eir:d1000_modem:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/ - Exploit, Third Party Advisory () https://devicereversing.wordpress.com/2016/11/07/eirs-d1000-modem-is-wide-open-to-being-hacked/ - Exploit, Third Party Advisory
References () https://ghostbin.com/paste/q2vq2 - () https://ghostbin.com/paste/q2vq2 -
References () https://isc.sans.edu/forums/diary/TR069+NewNTPServer+Exploits+What+we+know+so+far/21763/ - Exploit, Technical Description, Third Party Advisory () https://isc.sans.edu/forums/diary/TR069+NewNTPServer+Exploits+What+we+know+so+far/21763/ - Exploit, Technical Description, Third Party Advisory

Information

Published : 2017-05-16 14:29

Updated : 2024-11-21 02:43


NVD link : CVE-2016-10372

Mitre link : CVE-2016-10372

CVE.ORG link : CVE-2016-10372


JSON object : View

Products Affected

eir

  • d1000_modem_firmware
  • d1000_modem
CWE
CWE-264

Permissions, Privileges, and Access Controls