10

CVE-2016-10307

Exploit
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
GotrangoApex Lynx Firmware Version2.0
   GotrangoApex Lynx Version-
GotrangoApex Orion Firmware Version2.0
   GotrangoApex Orion Version-
GotrangoGiga Lynx Firmware Version2.0
   GotrangoGiga Lynx Version-
GotrangoGiga Orion Firmware Version2.0
   GotrangoGiga Orion Version-
GotrangoStratalink Firmware Version <= 3.0
   GotrangoStratalink Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.12% 0.763
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
CWE-798 Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.