CVE-2018-9149

The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor.
References
Link Resource
https://www.slideshare.net/secret/qrHwDOJ71eLg7f Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:zyxel:ac3000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:zyxel:ac3000:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-04-01 18:29

Updated : 2024-02-04 19:46


NVD link : CVE-2018-9149

Mitre link : CVE-2018-9149

CVE.ORG link : CVE-2018-9149


JSON object : View

Products Affected

zyxel

  • ac3000
  • ac3000_firmware
CWE
CWE-798

Use of Hard-coded Credentials