The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnerability to login and execute commands on the device, as well as upgrade the firmware image to a malicious version.
References
Link | Resource |
---|---|
https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ | Third Party Advisory |
https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf | Exploit Third Party Advisory |
https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ | Third Party Advisory |
https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ - Third Party Advisory | |
References | () https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf - Exploit, Third Party Advisory |
Information
Published : 2020-11-04 20:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27689
Mitre link : CVE-2020-27689
CVE.ORG link : CVE-2020-27689
JSON object : View
Products Affected
imomobile
- verve_connect_vh510
- verve_connect_vh510_firmware
CWE
CWE-798
Use of Hard-coded Credentials