Vulnerabilites related to aztech - dsl705eu
cve-2014-6436
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/69811 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/533489/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:17:24.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "69811", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69811" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "20140919 Re: Multiple Vulnerabilities with Aztech Modem Routers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "69811", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69811" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "20140919 Re: Multiple Vulnerabilities with Aztech Modem Routers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "69811", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69811" }, { "name": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "20140919 Re: Multiple Vulnerabilities with Aztech Modem Routers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6436", "datePublished": "2018-01-12T17:00:00", "dateReserved": "2014-09-16T00:00:00", "dateUpdated": "2024-08-06T12:17:24.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6435
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | x_refsource_MISC | |
http://www.securityfocus.com/bid/69809 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:17:23.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "69809", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69809" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-12T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "69809", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69809" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "69809", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69809" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6435", "datePublished": "2018-01-12T17:00:00", "dateReserved": "2014-09-16T00:00:00", "dateUpdated": "2024-08-06T12:17:23.931Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-6437
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/69808 | vdb-entry, x_refsource_BID | |
http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | x_refsource_MISC | |
http://www.securityfocus.com/archive/1/533489/100/0/threaded | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T12:17:23.883Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "69808", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69808" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "20140919 Re: Multiple Vulnerabilities with Aztech Modem Routers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "69808", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69808" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "20140919 Re: Multiple Vulnerabilities with Aztech Modem Routers", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-6437", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "69808", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69808" }, { "name": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "name": "20140919 Re: Multiple Vulnerabilities with Aztech Modem Routers", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-6437", "datePublished": "2018-01-12T17:00:00", "dateReserved": "2014-09-16T00:00:00", "dateUpdated": "2024-08-06T12:17:23.883Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-201801-0072
Vulnerability from variot
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login. plural Aztech ADSL The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AztechModemRouters is a Modem and router all-in-one product from Aztech Group of Singapore. A session hijacking vulnerability exists in several AztechModemRouters products. An attacker could exploit the vulnerability to gain access to affected devices. A session hijacking vulnerability exists in multiple Aztech Modem Routers products, allowing remote attackers to exploit vulnerabilities to access devices for unauthorized operation in other user contexts. The vulnerability stems from the fact that the program does not manage sessions correctly. PRODUCT DESCRIPTION
The Aztech ADSL family of modems/routes are shipped to residential and SOHO users that desires speed from 150-300mbps rate. This modem/router also supports IEEE802.11b/g/n as a Wireless LAN Access point. The vulnerable model numbers are: DSL5018EN (1T1R) (Shipped with Globe Telecom in the Philippines), DSL705E and DSL705EU.
Vendor reference: http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html
- Denial of Service (DoS)
The CGI script that resets the WAN connectivity of the modem can be called directly from the web server with no authentication. Sending a crafted HTTP GET request to the router via /cgi-bin/AZ_Retrain.cgi will allow an attacker to execute code that could potentially lead to Denial of Service (DoS) attack and may terminate or all established Internet connections in the network.
Proof of Concept for this vulnerability
Send a GET request to the cgi-bin/AZ_Retrain.cgi to reset the WAN connection: http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt
- The command may be freely executed from any terminal in the network as long as the session of the privilege ID is valid.
Proof of Concept for this vulnerability
- From computer A, open a web browser and login to the modem/router's web portal using the administrator ID.
-
From computer B, open a terminal session and make a POST request to the router: http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt
-
File and Data Exposure
The router's configuration file contains the hardware information as well as all of the user's credentials. This includes the customer's name and WAN account, the TR-069 credential of the telecom company and the web portal's admin username and password. A malicious attacker can send a direct GET request to the cgi-bin/userromfile.cgi script and download the ROM file. Although the ROM file is a ciphered text, this can be deciphered using a weak substitution technique (ROT 24) which could potentially lead to data exposure.
Proof of Concept for this vulnerability
a. Send a GET request to the router using cgi-bin/userromfile.cgi via curl: http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt b. Decipher the downloaded rommfile.cfg using Caesar cipher.
- Web Parameter Tampering
Some of the router's restricted and disabled settings can be acquired by checking the hidden fields in forms. Most of these settings can be manipulated by intercepting the data and manipulating the values upon submission. The below example shows how we manipulated the Access Control List in order to enable Telnet in the WAN section of the control panel before submitting the data.
Proof of Concept for this vulnerability
a. Open a web browser and redirect traffic to localhost:8080. b. Open burb proxy and intercept traffic coming from the browser. c. Login to the router's web portal and go to the page where the protected values are located. d. Find the reference to the hidden values in the form and modify it. e. Submit the request to the router. Refresh the browser to see the modified protected values.
Screenshots: http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz
The following CVE's precedes the above and were found as fixed:
CVE-2008-6588 _ Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote attackers to obtain access if this default is not changed. CVE-2008-6554 _ cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. CVE-2007-4733 _ The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077.
Researchers: Federick Joe Fajardo / fjpfajardo(at)ph.ibm.com, Lorenzo Miguel Flores / floresl(at)ph.ibm.com
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0072", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adsl dsl5018en \\", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl705eu", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl705e", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "modem routers", "scope": null, "trust": 1.2, "vendor": "aztech", "version": null }, { "model": "dsl5018en", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "dsl705e", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "dsl705eu", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "db": "NVD", "id": "CVE-2014-6436" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:aztech:adsl_dsl5018en_%281t1r%29_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:aztech:dsl705e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:aztech:dsl705eu_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008488" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eric Fajardo", "sources": [ { "db": "BID", "id": "69811" }, { "db": "CNNVD", "id": "CNNVD-201410-1209" } ], "trust": 0.9 }, "cve": "CVE-2014-6436", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2014-6436", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CNVD-2018-04208", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CNVD-2014-06214", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-74380", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2014-6436", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-6436", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2014-6436", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-04208", "trust": 0.6, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2014-06214", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201410-1209", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-74380", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2014-6436", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "VULHUB", "id": "VHN-74380" }, { "db": "VULMON", "id": "CVE-2014-6436" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "db": "NVD", "id": "CVE-2014-6436" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login. plural Aztech ADSL The device contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AztechModemRouters is a Modem and router all-in-one product from Aztech Group of Singapore. A session hijacking vulnerability exists in several AztechModemRouters products. An attacker could exploit the vulnerability to gain access to affected devices. A session hijacking vulnerability exists in multiple Aztech Modem Routers products, allowing remote attackers to exploit vulnerabilities to access devices for unauthorized operation in other user contexts. The vulnerability stems from the fact that the program does not manage sessions correctly. PRODUCT DESCRIPTION\n\nThe Aztech ADSL family of modems/routes are shipped to residential and SOHO users that desires speed from 150-300mbps rate. This modem/router also supports IEEE802.11b/g/n as a Wireless LAN Access point. The vulnerable model numbers are: DSL5018EN (1T1R) (Shipped with Globe Telecom in the Philippines), DSL705E and DSL705EU. \n\nVendor reference: http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html\n\n1. Denial of Service (DoS)\n\nThe CGI script that resets the WAN connectivity of the modem can be called directly from the web server with no authentication. Sending a crafted HTTP GET request to the router via /cgi-bin/AZ_Retrain.cgi will allow an attacker to execute code that could potentially lead to Denial of Service (DoS) attack and may terminate or all established Internet connections in the network. \n\nProof of Concept for this vulnerability\n\nSend a GET request to the cgi-bin/AZ_Retrain.cgi to reset the WAN connection: http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt\n\n2. The command may be freely executed from any terminal in the network as long as the session of the privilege ID is valid. \n\nProof of Concept for this vulnerability\n\n1. From computer A, open a web browser and login to the modem/router\u0027s web portal using the administrator ID. \n2. From computer B, open a terminal session and make a POST request to the router: http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt\n\n3. File and Data Exposure\n\nThe router\u0027s configuration file contains the hardware information as well as all of the user\u0027s credentials. This includes the customer\u0027s name and WAN account, the TR-069 credential of the telecom company and the web portal\u0027s admin username and password. A malicious attacker can send a direct GET request to the cgi-bin/userromfile.cgi script and download the ROM file. Although the ROM file is a ciphered text, this can be deciphered using a weak substitution technique (ROT 24) which could potentially lead to data exposure. \n\nProof of Concept for this vulnerability\n\na. Send a GET request to the router using cgi-bin/userromfile.cgi via curl: http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt\nb. Decipher the downloaded rommfile.cfg using Caesar cipher. \n\n4. Web Parameter Tampering\n\nSome of the router\u0027s restricted and disabled settings can be acquired by checking the hidden fields in forms. Most of these settings can be manipulated by intercepting the data and manipulating the values upon submission. The below example shows how we manipulated the Access Control List in order to enable Telnet in the WAN section of the control panel before submitting the data. \n\nProof of Concept for this vulnerability\n\na. Open a web browser and redirect traffic to localhost:8080. \nb. Open burb proxy and intercept traffic coming from the browser. \nc. Login to the router\u0027s web portal and go to the page where the protected values are located. \nd. Find the reference to the hidden values in the form and modify it. \ne. Submit the request to the router. Refresh the browser to see the modified protected values. \n\nScreenshots: http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz\n\nThe following CVE\u0027s precedes the above and were found as fixed:\n\nCVE-2008-6588 _ Aztech ADSL2/2+ 4-port router has a default \"isp\" account with a default \"isp\" password, which allows remote attackers to obtain access if this default is not changed. \nCVE-2008-6554 _ cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. \nCVE-2007-4733 _ The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077. \n\nResearchers:\nFederick Joe Fajardo / fjpfajardo(at)ph.ibm.com, Lorenzo Miguel Flores / floresl(at)ph.ibm.com\n", "sources": [ { "db": "NVD", "id": "CVE-2014-6436" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "BID", "id": "69811" }, { "db": "VULHUB", "id": "VHN-74380" }, { "db": "VULMON", "id": "CVE-2014-6436" }, { "db": "PACKETSTORM", "id": "128254" } ], "trust": 3.24 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-74380", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=39316", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-74380" }, { "db": "VULMON", "id": "CVE-2014-6436" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-6436", "trust": 3.6 }, { "db": "BID", "id": "69811", "trust": 3.3 }, { "db": "PACKETSTORM", "id": "128254", "trust": 2.7 }, { "db": "JVNDB", "id": "JVNDB-2014-008488", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-1209", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-04208", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2014-06214", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "39316", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-74380", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2014-6436", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "VULHUB", "id": "VHN-74380" }, { "db": "VULMON", "id": "CVE-2014-6436" }, { "db": "BID", "id": "69811" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "db": "NVD", "id": "CVE-2014-6436" } ] }, "id": "VAR-201801-0072", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "VULHUB", "id": "VHN-74380" } ], "trust": 2.0857143000000002 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 1.2 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" } ] }, "last_update_date": "2024-11-23T22:07:05.509000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.aztech.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008488" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-74380" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "NVD", "id": "CVE-2014-6436" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "http://www.securityfocus.com/bid/69811" }, { "trust": 2.6, "url": "http://packetstormsecurity.com/files/128254/aztech-dsl5018en-dsl705e-dsl705eu-dos-broken-session-management.html" }, { "trust": 1.2, "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6436" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6436" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/533489/100/0/threaded" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/39316/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6435" }, { "trust": 0.1, "url": "http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6437" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "VULHUB", "id": "VHN-74380" }, { "db": "VULMON", "id": "CVE-2014-6436" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "db": "NVD", "id": "CVE-2014-6436" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-04208" }, { "db": "CNVD", "id": "CNVD-2014-06214" }, { "db": "VULHUB", "id": "VHN-74380" }, { "db": "VULMON", "id": "CVE-2014-6436" }, { "db": "BID", "id": "69811" }, { "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "db": "NVD", "id": "CVE-2014-6436" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-05T00:00:00", "db": "CNVD", "id": "CNVD-2018-04208" }, { "date": "2014-09-23T00:00:00", "db": "CNVD", "id": "CNVD-2014-06214" }, { "date": "2018-01-12T00:00:00", "db": "VULHUB", "id": "VHN-74380" }, { "date": "2018-01-12T00:00:00", "db": "VULMON", "id": "CVE-2014-6436" }, { "date": "2014-09-15T00:00:00", "db": "BID", "id": "69811" }, { "date": "2018-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "date": "2014-09-15T19:44:56", "db": "PACKETSTORM", "id": "128254" }, { "date": "2014-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "date": "2018-01-12T17:29:00.350000", "db": "NVD", "id": "CVE-2014-6436" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-05T00:00:00", "db": "CNVD", "id": "CNVD-2018-04208" }, { "date": "2014-09-23T00:00:00", "db": "CNVD", "id": "CNVD-2014-06214" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-74380" }, { "date": "2018-10-09T00:00:00", "db": "VULMON", "id": "CVE-2014-6436" }, { "date": "2014-09-23T00:01:00", "db": "BID", "id": "69811" }, { "date": "2018-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008488" }, { "date": "2018-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1209" }, { "date": "2024-11-21T02:14:22.870000", "db": "NVD", "id": "CVE-2014-6436" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-1209" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Aztech ADSL Authentication vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008488" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-1209" } ], "trust": 0.6 } }
var-201801-0073
Vulnerability from variot
Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file. plural Aztech ADSL The device contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AztechModemRouters is a Modem and router all-in-one product from Aztech Group of Singapore. An information disclosure vulnerability exists in AztechModemRouters. An attacker could exploit the vulnerability to gain access to sensitive information and facilitate further attacks. Aztech Modem Routers are prone to an information-disclosure vulnerability. PRODUCT DESCRIPTION
The Aztech ADSL family of modems/routes are shipped to residential and SOHO users that desires speed from 150-300mbps rate. This modem/router also supports IEEE802.11b/g/n as a Wireless LAN Access point. The vulnerable model numbers are: DSL5018EN (1T1R) (Shipped with Globe Telecom in the Philippines), DSL705E and DSL705EU.
Vendor reference: http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html
- Denial of Service (DoS)
The CGI script that resets the WAN connectivity of the modem can be called directly from the web server with no authentication. Sending a crafted HTTP GET request to the router via /cgi-bin/AZ_Retrain.cgi will allow an attacker to execute code that could potentially lead to Denial of Service (DoS) attack and may terminate or all established Internet connections in the network.
Proof of Concept for this vulnerability
Send a GET request to the cgi-bin/AZ_Retrain.cgi to reset the WAN connection: http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt
- Broken Session Management
A successful authentication of a privilege (admin) ID in the web portal allows any attacker in the network to hijack and reuse the existing session in order to trick and allow the web server to execute administrative commands. The command may be freely executed from any terminal in the network as long as the session of the privilege ID is valid.
Proof of Concept for this vulnerability
- From computer A, open a web browser and login to the modem/router's web portal using the administrator ID.
-
From computer B, open a terminal session and make a POST request to the router: http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt
-
File and Data Exposure
The router's configuration file contains the hardware information as well as all of the user's credentials. This includes the customer's name and WAN account, the TR-069 credential of the telecom company and the web portal's admin username and password. A malicious attacker can send a direct GET request to the cgi-bin/userromfile.cgi script and download the ROM file. Although the ROM file is a ciphered text, this can be deciphered using a weak substitution technique (ROT 24) which could potentially lead to data exposure.
Proof of Concept for this vulnerability
a. Send a GET request to the router using cgi-bin/userromfile.cgi via curl: http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt b. Decipher the downloaded rommfile.cfg using Caesar cipher.
- Web Parameter Tampering
Some of the router's restricted and disabled settings can be acquired by checking the hidden fields in forms. Most of these settings can be manipulated by intercepting the data and manipulating the values upon submission. The below example shows how we manipulated the Access Control List in order to enable Telnet in the WAN section of the control panel before submitting the data.
Proof of Concept for this vulnerability
a. Open a web browser and redirect traffic to localhost:8080. b. Open burb proxy and intercept traffic coming from the browser. c. Login to the router's web portal and go to the page where the protected values are located. d. Find the reference to the hidden values in the form and modify it. e. Submit the request to the router. Refresh the browser to see the modified protected values.
Screenshots: http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz
The following CVE's precedes the above and were found as fixed:
CVE-2008-6588 _ Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote attackers to obtain access if this default is not changed. CVE-2008-6554 _ cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. CVE-2007-4733 _ The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077.
Researchers: Federick Joe Fajardo / fjpfajardo(at)ph.ibm.com, Lorenzo Miguel Flores / floresl(at)ph.ibm.com
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0073", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adsl dsl5018en \\", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl705eu", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl705e", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl5018en", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "dsl705e", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "dsl705eu", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "modem routers", "scope": null, "trust": 0.6, "vendor": "aztech", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "db": "NVD", "id": "CVE-2014-6437" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:aztech:adsl_dsl5018en_%281t1r%29_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:aztech:dsl705e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:aztech:dsl705eu_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008489" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Eric Fajardo", "sources": [ { "db": "BID", "id": "69808" }, { "db": "CNNVD", "id": "CNNVD-201410-1207" } ], "trust": 0.9 }, "cve": "CVE-2014-6437", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2014-6437", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2018-04209", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-74381", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2014-6437", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-6437", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2014-6437", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-04209", "trust": 0.6, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-201410-1207", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-74381", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "VULHUB", "id": "VHN-74381" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "db": "NVD", "id": "CVE-2014-6437" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file. plural Aztech ADSL The device contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AztechModemRouters is a Modem and router all-in-one product from Aztech Group of Singapore. An information disclosure vulnerability exists in AztechModemRouters. An attacker could exploit the vulnerability to gain access to sensitive information and facilitate further attacks. Aztech Modem Routers are prone to an information-disclosure vulnerability. PRODUCT DESCRIPTION\n\nThe Aztech ADSL family of modems/routes are shipped to residential and SOHO users that desires speed from 150-300mbps rate. This modem/router also supports IEEE802.11b/g/n as a Wireless LAN Access point. The vulnerable model numbers are: DSL5018EN (1T1R) (Shipped with Globe Telecom in the Philippines), DSL705E and DSL705EU. \n\nVendor reference: http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html\n\n1. Denial of Service (DoS)\n\nThe CGI script that resets the WAN connectivity of the modem can be called directly from the web server with no authentication. Sending a crafted HTTP GET request to the router via /cgi-bin/AZ_Retrain.cgi will allow an attacker to execute code that could potentially lead to Denial of Service (DoS) attack and may terminate or all established Internet connections in the network. \n\nProof of Concept for this vulnerability\n\nSend a GET request to the cgi-bin/AZ_Retrain.cgi to reset the WAN connection: http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt\n\n2. Broken Session Management\n\nA successful authentication of a privilege (admin) ID in the web portal allows any attacker in the network to hijack and reuse the existing session in order to trick and allow the web server to execute administrative commands. The command may be freely executed from any terminal in the network as long as the session of the privilege ID is valid. \n\nProof of Concept for this vulnerability\n\n1. From computer A, open a web browser and login to the modem/router\u0027s web portal using the administrator ID. \n2. From computer B, open a terminal session and make a POST request to the router: http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt\n\n3. File and Data Exposure\n\nThe router\u0027s configuration file contains the hardware information as well as all of the user\u0027s credentials. This includes the customer\u0027s name and WAN account, the TR-069 credential of the telecom company and the web portal\u0027s admin username and password. A malicious attacker can send a direct GET request to the cgi-bin/userromfile.cgi script and download the ROM file. Although the ROM file is a ciphered text, this can be deciphered using a weak substitution technique (ROT 24) which could potentially lead to data exposure. \n\nProof of Concept for this vulnerability\n\na. Send a GET request to the router using cgi-bin/userromfile.cgi via curl: http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt\nb. Decipher the downloaded rommfile.cfg using Caesar cipher. \n\n4. Web Parameter Tampering\n\nSome of the router\u0027s restricted and disabled settings can be acquired by checking the hidden fields in forms. Most of these settings can be manipulated by intercepting the data and manipulating the values upon submission. The below example shows how we manipulated the Access Control List in order to enable Telnet in the WAN section of the control panel before submitting the data. \n\nProof of Concept for this vulnerability\n\na. Open a web browser and redirect traffic to localhost:8080. \nb. Open burb proxy and intercept traffic coming from the browser. \nc. Login to the router\u0027s web portal and go to the page where the protected values are located. \nd. Find the reference to the hidden values in the form and modify it. \ne. Submit the request to the router. Refresh the browser to see the modified protected values. \n\nScreenshots: http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz\n\nThe following CVE\u0027s precedes the above and were found as fixed:\n\nCVE-2008-6588 _ Aztech ADSL2/2+ 4-port router has a default \"isp\" account with a default \"isp\" password, which allows remote attackers to obtain access if this default is not changed. \nCVE-2008-6554 _ cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. \nCVE-2007-4733 _ The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077. \n\nResearchers:\nFederick Joe Fajardo / fjpfajardo(at)ph.ibm.com, Lorenzo Miguel Flores / floresl(at)ph.ibm.com\n", "sources": [ { "db": "NVD", "id": "CVE-2014-6437" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "BID", "id": "69808" }, { "db": "VULHUB", "id": "VHN-74381" }, { "db": "PACKETSTORM", "id": "128254" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-74381", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-74381" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-6437", "trust": 3.5 }, { "db": "BID", "id": "69808", "trust": 2.6 }, { "db": "PACKETSTORM", "id": "128254", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2014-008489", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-1207", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-04209", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "39314", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-74381", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "VULHUB", "id": "VHN-74381" }, { "db": "BID", "id": "69808" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "db": "NVD", "id": "CVE-2014-6437" } ] }, "id": "VAR-201801-0073", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "VULHUB", "id": "VHN-74381" } ], "trust": 1.4857143 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" } ] }, "last_update_date": "2024-11-23T22:07:05.593000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.aztech.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008489" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-74381" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "NVD", "id": "CVE-2014-6437" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/128254/aztech-dsl5018en-dsl705e-dsl705eu-dos-broken-session-management.html" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/69808" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6437" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6437" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/533489/100/0/threaded" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6435" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6436" }, { "trust": 0.1, "url": "http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "VULHUB", "id": "VHN-74381" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "db": "NVD", "id": "CVE-2014-6437" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "VULHUB", "id": "VHN-74381" }, { "db": "BID", "id": "69808" }, { "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "db": "NVD", "id": "CVE-2014-6437" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-05T00:00:00", "db": "CNVD", "id": "CNVD-2018-04209" }, { "date": "2018-01-12T00:00:00", "db": "VULHUB", "id": "VHN-74381" }, { "date": "2014-09-15T00:00:00", "db": "BID", "id": "69808" }, { "date": "2018-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "date": "2014-09-15T19:44:56", "db": "PACKETSTORM", "id": "128254" }, { "date": "2014-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "date": "2018-01-12T17:29:00.397000", "db": "NVD", "id": "CVE-2014-6437" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-05T00:00:00", "db": "CNVD", "id": "CNVD-2018-04209" }, { "date": "2018-10-09T00:00:00", "db": "VULHUB", "id": "VHN-74381" }, { "date": "2014-09-23T00:01:00", "db": "BID", "id": "69808" }, { "date": "2018-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008489" }, { "date": "2018-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1207" }, { "date": "2024-11-21T02:14:23.020000", "db": "NVD", "id": "CVE-2014-6437" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-1207" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Aztech Modem Routers Information Disclosure Vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2018-04209" }, { "db": "BID", "id": "69808" } ], "trust": 0.9 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-1207" } ], "trust": 0.6 } }
var-201801-0071
Vulnerability from variot
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request. plural Aztech ADSL The device contains an authentication vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. AztechDSL5018EN, DSL705E and DSL705EU are router products of the Aztech Group of Singapore. A denial of service vulnerability exists in several Aztech routers. An attacker could exploit the vulnerability to crash an affected device, causing a denial of service. Aztech DSL5018EN, DSL705E and DSL705EU are vulnerable. The vulnerability is due to the fact that the program does not perform authentication detection. PRODUCT DESCRIPTION
The Aztech ADSL family of modems/routes are shipped to residential and SOHO users that desires speed from 150-300mbps rate. This modem/router also supports IEEE802.11b/g/n as a Wireless LAN Access point. The vulnerable model numbers are: DSL5018EN (1T1R) (Shipped with Globe Telecom in the Philippines), DSL705E and DSL705EU.
Vendor reference: http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html
- Sending a crafted HTTP GET request to the router via /cgi-bin/AZ_Retrain.cgi will allow an attacker to execute code that could potentially lead to Denial of Service (DoS) attack and may terminate or all established Internet connections in the network.
Proof of Concept for this vulnerability
Send a GET request to the cgi-bin/AZ_Retrain.cgi to reset the WAN connection: http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt
- Broken Session Management
A successful authentication of a privilege (admin) ID in the web portal allows any attacker in the network to hijack and reuse the existing session in order to trick and allow the web server to execute administrative commands. The command may be freely executed from any terminal in the network as long as the session of the privilege ID is valid.
Proof of Concept for this vulnerability
- From computer A, open a web browser and login to the modem/router's web portal using the administrator ID.
-
From computer B, open a terminal session and make a POST request to the router: http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt
-
File and Data Exposure
The router's configuration file contains the hardware information as well as all of the user's credentials. This includes the customer's name and WAN account, the TR-069 credential of the telecom company and the web portal's admin username and password. A malicious attacker can send a direct GET request to the cgi-bin/userromfile.cgi script and download the ROM file. Although the ROM file is a ciphered text, this can be deciphered using a weak substitution technique (ROT 24) which could potentially lead to data exposure.
Proof of Concept for this vulnerability
a. Send a GET request to the router using cgi-bin/userromfile.cgi via curl: http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt b. Decipher the downloaded rommfile.cfg using Caesar cipher.
- Web Parameter Tampering
Some of the router's restricted and disabled settings can be acquired by checking the hidden fields in forms. Most of these settings can be manipulated by intercepting the data and manipulating the values upon submission. The below example shows how we manipulated the Access Control List in order to enable Telnet in the WAN section of the control panel before submitting the data.
Proof of Concept for this vulnerability
a. Open a web browser and redirect traffic to localhost:8080. b. Open burb proxy and intercept traffic coming from the browser. c. Login to the router's web portal and go to the page where the protected values are located. d. Find the reference to the hidden values in the form and modify it. e. Submit the request to the router. Refresh the browser to see the modified protected values.
Screenshots: http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz
The following CVE's precedes the above and were found as fixed:
CVE-2008-6588 _ Aztech ADSL2/2+ 4-port router has a default "isp" account with a default "isp" password, which allows remote attackers to obtain access if this default is not changed. CVE-2008-6554 _ cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. CVE-2007-4733 _ The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077.
Researchers: Federick Joe Fajardo / fjpfajardo(at)ph.ibm.com, Lorenzo Miguel Flores / floresl(at)ph.ibm.com
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0071", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "adsl dsl5018en \\", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl705eu", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl705e", "scope": "eq", "trust": 1.6, "vendor": "aztech", "version": null }, { "model": "dsl5018en", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "dsl705e", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "dsl705eu", "scope": null, "trust": 0.8, "vendor": "aztech group", "version": null }, { "model": "adsl dsl5018en", "scope": null, "trust": 0.6, "vendor": "aztech", "version": null }, { "model": "dsl705e", "scope": null, "trust": 0.6, "vendor": "aztech", "version": null }, { "model": "dsl705eu", "scope": null, "trust": 0.6, "vendor": "aztech", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "db": "NVD", "id": "CVE-2014-6435" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:aztech:adsl_dsl5018en_%281t1r%29_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:aztech:dsl705e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:aztech:dsl705eu_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008487" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Federick Joe P Fajardo", "sources": [ { "db": "BID", "id": "69809" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1208" } ], "trust": 1.0 }, "cve": "CVE-2014-6435", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2014-6435", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2018-04207", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-74379", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2014-6435", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2014-6435", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2014-6435", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2018-04207", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201410-1208", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-74379", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "VULHUB", "id": "VHN-74379" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "db": "NVD", "id": "CVE-2014-6435" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request. plural Aztech ADSL The device contains an authentication vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. AztechDSL5018EN, DSL705E and DSL705EU are router products of the Aztech Group of Singapore. A denial of service vulnerability exists in several Aztech routers. An attacker could exploit the vulnerability to crash an affected device, causing a denial of service. \nAztech DSL5018EN, DSL705E and DSL705EU are vulnerable. The vulnerability is due to the fact that the program does not perform authentication detection. PRODUCT DESCRIPTION\n\nThe Aztech ADSL family of modems/routes are shipped to residential and SOHO users that desires speed from 150-300mbps rate. This modem/router also supports IEEE802.11b/g/n as a Wireless LAN Access point. The vulnerable model numbers are: DSL5018EN (1T1R) (Shipped with Globe Telecom in the Philippines), DSL705E and DSL705EU. \n\nVendor reference: http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html\n\n1. Sending a crafted HTTP GET request to the router via /cgi-bin/AZ_Retrain.cgi will allow an attacker to execute code that could potentially lead to Denial of Service (DoS) attack and may terminate or all established Internet connections in the network. \n\nProof of Concept for this vulnerability\n\nSend a GET request to the cgi-bin/AZ_Retrain.cgi to reset the WAN connection: http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt\n\n2. Broken Session Management\n\nA successful authentication of a privilege (admin) ID in the web portal allows any attacker in the network to hijack and reuse the existing session in order to trick and allow the web server to execute administrative commands. The command may be freely executed from any terminal in the network as long as the session of the privilege ID is valid. \n\nProof of Concept for this vulnerability\n\n1. From computer A, open a web browser and login to the modem/router\u0027s web portal using the administrator ID. \n2. From computer B, open a terminal session and make a POST request to the router: http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt\n\n3. File and Data Exposure\n\nThe router\u0027s configuration file contains the hardware information as well as all of the user\u0027s credentials. This includes the customer\u0027s name and WAN account, the TR-069 credential of the telecom company and the web portal\u0027s admin username and password. A malicious attacker can send a direct GET request to the cgi-bin/userromfile.cgi script and download the ROM file. Although the ROM file is a ciphered text, this can be deciphered using a weak substitution technique (ROT 24) which could potentially lead to data exposure. \n\nProof of Concept for this vulnerability\n\na. Send a GET request to the router using cgi-bin/userromfile.cgi via curl: http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt\nb. Decipher the downloaded rommfile.cfg using Caesar cipher. \n\n4. Web Parameter Tampering\n\nSome of the router\u0027s restricted and disabled settings can be acquired by checking the hidden fields in forms. Most of these settings can be manipulated by intercepting the data and manipulating the values upon submission. The below example shows how we manipulated the Access Control List in order to enable Telnet in the WAN section of the control panel before submitting the data. \n\nProof of Concept for this vulnerability\n\na. Open a web browser and redirect traffic to localhost:8080. \nb. Open burb proxy and intercept traffic coming from the browser. \nc. Login to the router\u0027s web portal and go to the page where the protected values are located. \nd. Find the reference to the hidden values in the form and modify it. \ne. Submit the request to the router. Refresh the browser to see the modified protected values. \n\nScreenshots: http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz\n\nThe following CVE\u0027s precedes the above and were found as fixed:\n\nCVE-2008-6588 _ Aztech ADSL2/2+ 4-port router has a default \"isp\" account with a default \"isp\" password, which allows remote attackers to obtain access if this default is not changed. \nCVE-2008-6554 _ cgi-bin/script in Aztech ADSL2/2+ 4-port router 3.7.0 build 070426 allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. \nCVE-2007-4733 _ The Aztech DSL600EU router, when WAN access to the web interface is disabled, does not properly block inbound traffic on TCP port 80, which allows remote attackers to connect to the web interface by guessing a TCP sequence number, possibly involving spoofing of an ARP packet, a related issue to CVE-1999-0077. \n\nResearchers:\nFederick Joe Fajardo / fjpfajardo(at)ph.ibm.com, Lorenzo Miguel Flores / floresl(at)ph.ibm.com\n", "sources": [ { "db": "NVD", "id": "CVE-2014-6435" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "BID", "id": "69809" }, { "db": "VULHUB", "id": "VHN-74379" }, { "db": "PACKETSTORM", "id": "128254" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-74379", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-74379" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-6435", "trust": 3.5 }, { "db": "BID", "id": "69809", "trust": 2.6 }, { "db": "PACKETSTORM", "id": "128254", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2014-008487", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201410-1208", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2018-04207", "trust": 0.6 }, { "db": "EXPLOIT-DB", "id": "39315", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-74379", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "VULHUB", "id": "VHN-74379" }, { "db": "BID", "id": "69809" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "db": "NVD", "id": "CVE-2014-6435" } ] }, "id": "VAR-201801-0071", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "VULHUB", "id": "VHN-74379" } ], "trust": 1.2714286 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04207" } ] }, "last_update_date": "2024-11-23T22:07:05.554000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.aztech.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008487" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-74379" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "NVD", "id": "CVE-2014-6435" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://packetstormsecurity.com/files/128254/aztech-dsl5018en-dsl705e-dsl705eu-dos-broken-session-management.html" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/69809" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6435" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-6435" }, { "trust": 0.3, "url": "http://www.aztech.com" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6436" }, { "trust": 0.1, "url": "http://www.aztech.com/prod_adsl_dsl5018en_1t1r.html" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/aztech.img.tgz" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2014-6437" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azpass.txt" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azgetconf.txt" }, { "trust": 0.1, "url": "http://x.arpa.ph/fjpf/aztech-exploits/azreset.txt" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "VULHUB", "id": "VHN-74379" }, { "db": "BID", "id": "69809" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "db": "NVD", "id": "CVE-2014-6435" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2018-04207" }, { "db": "VULHUB", "id": "VHN-74379" }, { "db": "BID", "id": "69809" }, { "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "db": "PACKETSTORM", "id": "128254" }, { "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "db": "NVD", "id": "CVE-2014-6435" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-05T00:00:00", "db": "CNVD", "id": "CNVD-2018-04207" }, { "date": "2018-01-12T00:00:00", "db": "VULHUB", "id": "VHN-74379" }, { "date": "2014-09-15T00:00:00", "db": "BID", "id": "69809" }, { "date": "2018-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "date": "2014-09-15T19:44:56", "db": "PACKETSTORM", "id": "128254" }, { "date": "2014-09-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "date": "2018-01-12T17:29:00.287000", "db": "NVD", "id": "CVE-2014-6435" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-05T00:00:00", "db": "CNVD", "id": "CNVD-2018-04207" }, { "date": "2018-01-31T00:00:00", "db": "VULHUB", "id": "VHN-74379" }, { "date": "2014-09-23T00:01:00", "db": "BID", "id": "69809" }, { "date": "2018-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-008487" }, { "date": "2018-01-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201410-1208" }, { "date": "2024-11-21T02:14:22.717000", "db": "NVD", "id": "CVE-2014-6435" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-1208" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural Aztech ADSL Authentication vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-008487" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-201410-1208" } ], "trust": 0.6 } }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/archive/1/533489/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/69811 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533489/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69811 | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
aztech | adsl_dsl5018en_\(1t1r\)_firmware | - | |
aztech | adsl_dsl5018en_\(1t1r\) | - | |
aztech | dsl705e_firmware | - | |
aztech | dsl705e | - | |
aztech | dsl705eu_firmware | - | |
aztech | dsl705eu | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:adsl_dsl5018en_\\(1t1r\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7EAEBDA-7647-468C-B74E-0E5BFC9926DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:adsl_dsl5018en_\\(1t1r\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DE6B23-0A44-4606-861D-B00123FDEC46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:dsl705e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E1517-E45F-4BC6-9CE3-3458F3B321F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:dsl705e:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEE2578A-F0E4-43E2-A152-1CB50C10436E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:dsl705eu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB9E6C8-5E62-4829-87C3-9750824CF657", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:dsl705eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DDF7317-E11C-4B84-9D9A-1AFA70347305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login." }, { "lang": "es", "value": "Los dispositivos Aztech ADSL DSL5018EN (1T1R), DSL705E y DSL705EU gestionan las sesiones de forma indebida, lo que permite que atacantes remotos omitan la autenticaci\u00f3n en circunstancias oportunistas y ejecuten comandos arbitrarios con privilegios de administrador aprovechando un inicio de sesi\u00f3n ya existente en el portal web." } ], "id": "CVE-2014-6436", "lastModified": "2024-11-21T02:14:22.870", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-12T17:29:00.350", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69811" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69811" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/69809 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69809 | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
aztech | adsl_dsl5018en_\(1t1r\)_firmware | - | |
aztech | adsl_dsl5018en_\(1t1r\) | - | |
aztech | dsl705e_firmware | - | |
aztech | dsl705e | - | |
aztech | dsl705eu_firmware | - | |
aztech | dsl705eu | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:adsl_dsl5018en_\\(1t1r\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7EAEBDA-7647-468C-B74E-0E5BFC9926DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:adsl_dsl5018en_\\(1t1r\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DE6B23-0A44-4606-861D-B00123FDEC46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:dsl705e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E1517-E45F-4BC6-9CE3-3458F3B321F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:dsl705e:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEE2578A-F0E4-43E2-A152-1CB50C10436E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:dsl705eu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB9E6C8-5E62-4829-87C3-9750824CF657", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:dsl705eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DDF7317-E11C-4B84-9D9A-1AFA70347305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request." }, { "lang": "es", "value": "cgi-bin/AZ_Retrain.cgi en dispositivos Aztech ADSL DSL5018EN (1T1R), DSL705E y DSL705EU no realiza comprobaciones de autenticaci\u00f3n, lo que permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (restablecimiento de la conectividad WAN) mediante una petici\u00f3n directa." } ], "id": "CVE-2014-6435", "lastModified": "2024-11-21T02:14:22.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-12T17:29:00.287", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69809" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/archive/1/533489/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/69808 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533489/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69808 | Third Party Advisory, VDB Entry |
Vendor | Product | Version | |
---|---|---|---|
aztech | adsl_dsl5018en_\(1t1r\)_firmware | - | |
aztech | adsl_dsl5018en_\(1t1r\) | - | |
aztech | dsl705e_firmware | - | |
aztech | dsl705e | - | |
aztech | dsl705eu_firmware | - | |
aztech | dsl705eu | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:adsl_dsl5018en_\\(1t1r\\)_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7EAEBDA-7647-468C-B74E-0E5BFC9926DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:adsl_dsl5018en_\\(1t1r\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "D6DE6B23-0A44-4606-861D-B00123FDEC46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:dsl705e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F0E1517-E45F-4BC6-9CE3-3458F3B321F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:dsl705e:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEE2578A-F0E4-43E2-A152-1CB50C10436E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:aztech:dsl705eu_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AB9E6C8-5E62-4829-87C3-9750824CF657", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:aztech:dsl705eu:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DDF7317-E11C-4B84-9D9A-1AFA70347305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices allow remote attackers to obtain sensitive device configuration information via vectors involving the ROM file." }, { "lang": "es", "value": "Los dispositivos Aztech ADSL DSL5018EN (1T1R), DSL705E y DSL705EU permiten que atacantes remotos obtengan informaci\u00f3n de configuraci\u00f3n sensible del dispositivo mediante vectores relacionados con el archivo ROM." } ], "id": "CVE-2014-6437", "lastModified": "2024-11-21T02:14:23.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-12T17:29:00.397", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69808" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533489/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/69808" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }