Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.
References
Link | Resource |
---|---|
https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
14 Oct 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1392 |
09 Jun 2023, 22:16
Type | Values Removed | Values Added |
---|---|---|
First Time |
Hitrontech coda-5310 Firmware
Hitrontech Hitrontech coda-5310 |
|
CPE | cpe:2.3:o:hitrontech:coda-5310_firmware:7.2.4.7.1b3:*:*:*:*:*:*:* cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:* |
|
References | (MISC) https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html - Third Party Advisory |
02 Jun 2023, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-02 11:15
Updated : 2024-10-14 04:15
NVD link : CVE-2023-30603
Mitre link : CVE-2023-30603
CVE.ORG link : CVE-2023-30603
JSON object : View
Products Affected
hitrontech
- coda-5310_firmware
- coda-5310
CWE
CWE-1392
Use of Default Credentials