All ADB broadband gateways / routers based on the Epicentro platform are affected by an authorization bypass vulnerability where attackers are able to access and manipulate settings within the web interface that are forbidden to end users (e.g., by the ISP). An attacker would be able to enable the TELNET server or other settings as well.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2018/Jul/18 | Mailing List Third Party Advisory |
http://www.securityfocus.com/archive/1/542119/100/0/threaded | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44982/ | Third Party Advisory VDB Entry |
https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
No history.
Information
Published : 2018-07-06 14:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-13109
Mitre link : CVE-2018-13109
CVE.ORG link : CVE-2018-13109
JSON object : View
Products Affected
adbglobal
- prg_av4202n
- vv2220_firmware
- dv2210
- vv5522_firmware
- vv5522
- dv2210_firmware
- prg_av4202n_firmware
- vv2220
CWE
CWE-863
Incorrect Authorization