Permalink
Cannot retrieve contributors at this time
Name already in use
A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Zyxel-NBG-418N-v2/CVE-2019-17354
Go to fileThis commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
51 lines (33 sloc)
1.73 KB
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Description: | |
| An issue discovered on Zyxel NBG-418N v2 device with firmware version V1.00(AARP.9)C0. wan.htm can be accessed directly without | |
| authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify | |
| the data fields of the page. | |
| ------------------------------------------------------------------------------------ | |
| Vulnerability Type: | |
| Incorrect Access Control | |
| ------------------------------------------------------------------------------------ | |
| Vendor of Product: | |
| Zyxel | |
| ------------------------------------------------------------------------------------ | |
| Affected Product Code Base: | |
| NBG-418N v2 - V1.00(AARP.9)C0 | |
| ------------------------------------------------------------------------------------ | |
| Attack Type: | |
| Remote | |
| ------------------------------------------------------------------------------------ | |
| Impact: | |
| Denial of Service => true | |
| ------------------------------------------------------------------------------------ | |
| Impact: | |
| Information Disclosure => true | |
| ------------------------------------------------------------------------------------ | |
| Attack Vectors: | |
| WAN configuration page "wan.htm" on Zyxel NBG-418N v2 device with firmware V1.00(AARP.9)C0 can be accessed directly | |
| without authentication which can lead to disclose the information about WAN settings and also leverage attacker to modify the | |
| data fields of page e.g.: "<Zyxel_NBG-418N_v2_router_ip>/wan.htm" | |
| ------------------------------------------------------------------------------------ | |
| CVE Reference: | |
| CVE-2019-17354 | |
| ------------------------------------------------------------------------------------ | |
| Credits: | |
| This security vulnerability was found by Devendra Singh Solanki (https://twitter.com/_d0x0_) |