CVE-2023-30603

Hitron Technologies CODA-5310 Telnet function with the default account and password, and there is no warning or prompt to ask users to change the default password and account. An unauthenticated remote attackers can exploit this vulnerability to obtain the administrator’s privilege, resulting in performing arbitrary system operation or disrupt service.
References
Link Resource
https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:hitrontech:coda-5310_firmware:7.2.4.7.1b3:*:*:*:*:*:*:*
cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:*

History

14 Oct 2024, 04:15

Type Values Removed Values Added
CWE CWE-287 CWE-1392

09 Jun 2023, 22:16

Type Values Removed Values Added
First Time Hitrontech coda-5310 Firmware
Hitrontech
Hitrontech coda-5310
CPE cpe:2.3:o:hitrontech:coda-5310_firmware:7.2.4.7.1b3:*:*:*:*:*:*:*
cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:*
References (MISC) https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html - (MISC) https://www.twcert.org.tw/tw/cp-132-7085-13321-1.html - Third Party Advisory

02 Jun 2023, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-02 11:15

Updated : 2024-10-14 04:15


NVD link : CVE-2023-30603

Mitre link : CVE-2023-30603

CVE.ORG link : CVE-2023-30603


JSON object : View

Products Affected

hitrontech

  • coda-5310_firmware
  • coda-5310
CWE
CWE-1392

Use of Default Credentials