Telesquare SDT-CS3B1 and SDT-CW3B1 devices through 1.2.0 have a default factory account. Remote attackers can obtain access to the device via TELNET using a hardcoded account.
References
Link | Resource |
---|---|
https://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=27284 | Third Party Advisory |
https://www.fortiguard.com/zeroday/FG-VD-18-106 | Third Party Advisory |
https://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=27284 | Third Party Advisory |
https://www.fortiguard.com/zeroday/FG-VD-18-106 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=27284 - Third Party Advisory | |
References | () https://www.fortiguard.com/zeroday/FG-VD-18-106 - Third Party Advisory |
Information
Published : 2018-06-21 15:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12526
Mitre link : CVE-2018-12526
CVE.ORG link : CVE-2018-12526
JSON object : View
Products Affected
telesquare
- sdt-cs3b1
- sdt-cw3b1
- sdt-cs3b1_firmware
- sdt-cw3b1_firmware
CWE
CWE-798
Use of Hard-coded Credentials