Total
40 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-27166 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon. | |||||
CVE-2021-27139 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to extract information from the device without authentication by disabling JavaScript and visiting /info.asp. | |||||
CVE-2021-27154 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / G0R2U1P2ag credentials for an ISP. | |||||
CVE-2021-27174 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions. | |||||
CVE-2021-27164 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP. | |||||
CVE-2021-27177 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server. | |||||
CVE-2021-27161 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP. | |||||
CVE-2021-27141 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. Credentials in /fhconf/umconfig.txt are obfuscated via XOR with the hardcoded *j7a(L#yZ98sSd5HfSgGjMj8;Ss;d)(*&^#@$a2s0i3g key. (The webs binary has details on how XOR is used.) | |||||
CVE-2021-27158 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded L1vt1m4eng / 888888 credentials for an ISP. | |||||
CVE-2021-27163 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP. | |||||
CVE-2021-27175 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions. | |||||
CVE-2021-27145 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / lnadmin credentials for an ISP. | |||||
CVE-2021-27140 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to find passwords and authentication cookies stored in cleartext in the web.log HTTP logs. | |||||
CVE-2021-27149 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded adminpldt / z6dUABtl270qRxt7a2uGTiw credentials for an ISP. | |||||
CVE-2021-27148 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded telecomadmin / nE7jA%5m credentials for an ISP. | |||||
CVE-2021-27171 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 10.0 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell). | |||||
CVE-2021-27165 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 5.0 MEDIUM | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials. | |||||
CVE-2021-27146 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / CUadmin credentials for an ISP. | |||||
CVE-2021-27151 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded rootmet / m3tr0r00t credentials for an ISP. | |||||
CVE-2021-27150 | 1 Fiberhome | 2 Hg6245d, Hg6245d Firmware | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded gestiontelebucaramanga / t3l3buc4r4m4ng42013 credentials for an ISP. |