CVE-2019-14919

An exposed Telnet Service on the Billion Smart Energy Router SG600R2 with firmware v3.02.rc6 allows a local network attacker to authenticate via hardcoded credentials into a shell, gaining root execution privileges over the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:billion:sg600_r2_firmware:3.02:rc6:*:*:*:*:*:*
cpe:2.3:h:billion:sg600_r2:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:27

Type Values Removed Values Added
References () https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection - Exploit, Third Party Advisory () https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection - Exploit, Third Party Advisory

Information

Published : 2020-01-09 17:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-14919

Mitre link : CVE-2019-14919

CVE.ORG link : CVE-2019-14919


JSON object : View

Products Affected

billion

  • sg600_r2_firmware
  • sg600_r2
CWE
CWE-798

Use of Hard-coded Credentials