8.8
CVE-2018-16201
- EPSS 0.12%
- Veröffentlicht 09.01.2019 23:29:04
- Zuletzt bearbeitet 21.11.2024 03:52:16
- Quelle vultures@jpcert.or.jp
- CVE-Watchlists
- Unerledigt
Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Toshiba ≫ Hem-gw16a Firmware Version <= 1.2.9
Toshiba ≫ Hem-gw26a Firmware Version <= 1.2.9
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.12% | 0.272 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 8.3 | 6.5 | 10 |
AV:A/AC:L/Au:N/C:C/I:C/A:C
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.