ZyXEL ES-2024PWR Switch
Platform Information | https://www.cnet.com/products/zyxel-dimension-es-2024pwr-switch-24-ports-managed-desktop-series/ |
---|---|
Search Engine | Search on Google |
End of Sales | - |
End of Support | - |
Wired Connection | Yes |
Wireless Connection | - |
Fingerprinting Source | HTTP NIC VENDOR |
Added at | Nov 05, 2019 |
Manufacturer Name | Zyxel Communications Corp |
Homepage | https://www.zyxel.com/index.shtml |
Headquarters | Taiwan |
Business Status | Ongoing |
Platform’s Common Vulnerabilities and Exposures (CVE) | ||
---|---|---|
CVE-ID
Severity v3.0
Severity v2.0
Description
|
||
No records found.
|
Manufacturer’s Common Vulnerabilities and Exposures (CVE) | ||
---|---|---|
CVE-ID
Severity v3.0
Severity v2.0
Description
|
||
CVE-2019-6725
05/31/2019 CRITICAL
HIGH
The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin.
|
||
CVE-2017-18374
05/02/2019 HIGH
HIGH
The ZyXEL P660HN-T1A v1 TCLinux Fw $7.3.15.0 v001 / 3.40(ULM.0)b31 router distributed by TrueOnline has two user accounts with default passwords, including a hardcoded service account with the username true and password true. These accounts can be used to login to the web interface, exploit authenticated command injections and change router settings for malicious purposes.
|
||
CVE-2017-18372
05/02/2019 HIGH
HIGH
The Billion 5200W-T TCLinux Fw $7.3.8.0 v008 130603 router distributed by TrueOnline has a command injection vulnerability in the Time Setting function, which is only accessible by an authenticated user. The vulnerability is in the tools_time.asp page and can be exploited through the uiViewSNTPServer parameter. Authentication can be achieved by exploiting CVE-2017-18373.
|
||
CVE-2017-18371
05/02/2019 CRITICAL
HIGH
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.
|
||
CVE-2017-18370
05/02/2019 HIGH
HIGH
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has a command injection vulnerability in the Remote System Log forwarding function, which is only accessible by an authenticated user. The vulnerability is in the logSet.asp page and can be exploited through the ServerIP parameter. Authentication can be achieved by exploiting CVE-2017-18371.
|