CVE-2019-6725

The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin.
References
Link Resource
https://seclists.org/bugtraq/2019/May/78 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2019/May/78 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:p-660hn-t1_firmware:2.00\(aakk.3\):*:*:*:*:*:*:*
cpe:2.3:h:zyxel:p-660hn-t1:2:*:*:*:*:*:*:*

History

21 Nov 2024, 04:47

Type Values Removed Values Added
References () https://seclists.org/bugtraq/2019/May/78 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2019/May/78 - Mailing List, Third Party Advisory

Information

Published : 2019-05-31 22:29

Updated : 2024-11-21 04:47


NVD link : CVE-2019-6725

Mitre link : CVE-2019-6725

CVE.ORG link : CVE-2019-6725


JSON object : View

Products Affected

zyxel

  • p-660hn-t1
  • p-660hn-t1_firmware
CWE
CWE-798

Use of Hard-coded Credentials