The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin.
References
Link | Resource |
---|---|
https://seclists.org/bugtraq/2019/May/78 | Mailing List Third Party Advisory |
https://seclists.org/bugtraq/2019/May/78 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 04:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://seclists.org/bugtraq/2019/May/78 - Mailing List, Third Party Advisory |
Information
Published : 2019-05-31 22:29
Updated : 2024-11-21 04:47
NVD link : CVE-2019-6725
Mitre link : CVE-2019-6725
CVE.ORG link : CVE-2019-6725
JSON object : View
Products Affected
zyxel
- p-660hn-t1
- p-660hn-t1_firmware
CWE
CWE-798
Use of Hard-coded Credentials