Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/533489/100/0/threaded | |
http://www.securityfocus.com/bid/69811 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2018-01-12 17:29
Updated : 2024-02-04 19:29
NVD link : CVE-2014-6436
Mitre link : CVE-2014-6436
CVE.ORG link : CVE-2014-6436
JSON object : View
Products Affected
aztech
- adsl_dsl5018en_\(1t1r\)_firmware
- dsl705e_firmware
- dsl705eu_firmware
- dsl705eu
- adsl_dsl5018en_\(1t1r\)
- dsl705e
CWE
CWE-287
Improper Authentication