A hidden backdoor on PATLITE NH-FB Series devices with firmware version 1.45 or earlier, NH-FV Series devices with firmware version 1.10 or earlier, and NBM Series devices with firmware version 1.09 or earlier allow attackers to enable an SSH daemon via the "kankichi" or "kamiyo4" password to the _secret1.htm URI. Subsequently, the default password of root for the root account allows an attacker to conduct remote code execution and as a result take over the system.
References
Link | Resource |
---|---|
https://herolab.usd.de/wp-content/uploads/sites/4/usd20180020.txt | Exploit Third Party Advisory |
https://www.patlite.com/support/Security_Informationtest.html | |
https://herolab.usd.de/wp-content/uploads/sites/4/usd20180020.txt | Exploit Third Party Advisory |
https://www.patlite.com/support/Security_Informationtest.html |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 03:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://herolab.usd.de/wp-content/uploads/sites/4/usd20180020.txt - Exploit, Third Party Advisory | |
References | () https://www.patlite.com/support/Security_Informationtest.html - |
Information
Published : 2019-03-21 16:00
Updated : 2024-11-21 03:55
NVD link : CVE-2018-18473
Mitre link : CVE-2018-18473
CVE.ORG link : CVE-2018-18473
JSON object : View
Products Affected
patlite
- nhl-3fb1_firmware
- nbm-d88n
- nhl-3fb1
- nhl-3fv1n_firmware
- nhl-3fv1n
- nbm-d88n_firmware
CWE
CWE-798
Use of Hard-coded Credentials