ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
References
Link | Resource |
---|---|
https://forum.openwrt.org/viewtopic.php?id=62266 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43105/ | |
https://forum.openwrt.org/viewtopic.php?id=62266 | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/43105/ |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://forum.openwrt.org/viewtopic.php?id=62266 - Exploit, Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43105/ - |
Information
Published : 2017-07-25 18:29
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10401
Mitre link : CVE-2016-10401
CVE.ORG link : CVE-2016-10401
JSON object : View
Products Affected
zyxel
- pk5001z_firmware
- pk5001z
CWE
CWE-255
Credentials Management Errors