CVE-2017-3216

WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:greenpacket:ox350_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:greenpacket:ox350:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:huawei:bm2022_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:huawei:bm2022:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:huawei:hes-309m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:huawei:hes-309m:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:huawei:hes-319m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:huawei:hes-319m:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:huawei:hes-319m2w_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:huawei:hes-319m2w:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:huawei:hes-339m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:huawei:hes-339m:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:mada:soho_wireless_router_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mada:soho_wireless_router:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:zte:ox-330p_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zte:ox-330p:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:zyxel:max218m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:max218m:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:zyxel:max218m1w_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:max218m1w:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:zyxel:max218mw_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:max218mw:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:zyxel:max308m_fimware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:max308m:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:zyxel:max318m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:max318m:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:zyxel:max338m_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:max338m:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:25

Type Values Removed Values Added
References () http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html - Third Party Advisory () http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html - Third Party Advisory
References () http://www.kb.cert.org/vuls/id/350135 - Mitigation, Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/350135 - Mitigation, Third Party Advisory, US Government Resource
References () https://sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170607-0_Various_WiMAX_CPEs_Authentication_Bypass_v10.txt - Exploit, Third Party Advisory () https://sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170607-0_Various_WiMAX_CPEs_Authentication_Bypass_v10.txt - Exploit, Third Party Advisory

Information

Published : 2017-06-20 00:29

Updated : 2024-11-21 03:25


NVD link : CVE-2017-3216

Mitre link : CVE-2017-3216

CVE.ORG link : CVE-2017-3216


JSON object : View

Products Affected

zyxel

  • max308m
  • max318m_firmware
  • max318m
  • max338m
  • max218m_firmware
  • max308m_fimware
  • max218mw_firmware
  • max218m1w_firmware
  • max338m_firmware
  • max218m1w
  • max218mw
  • max218m

zte

  • ox-330p_firmware
  • ox-330p

huawei

  • hes-339m
  • hes-319m2w
  • bm2022_firmware
  • bm2022
  • hes-319m2w_firmware
  • hes-309m_firmware
  • hes-319m
  • hes-319m_firmware
  • hes-339m_firmware
  • hes-309m

mada

  • soho_wireless_router_firmware
  • soho_wireless_router

greenpacket

  • ox350
  • ox350_firmware
CWE
CWE-306

Missing Authentication for Critical Function