10
CVE-2019-6725
- EPSS 0.44%
- Veröffentlicht 31.05.2019 22:29:01
- Zuletzt bearbeitet 21.11.2024 04:47:00
- Quelle cve@mitre.org
- Teams Watchlist Login
- Unerledigt Login
The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zyxel ≫ P-660hn-t1 Firmware Version2.00(aakk.3)
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.44% | 0.62 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 10 | 10 | 10 |
AV:N/AC:L/Au:N/C:C/I:C/A:C
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.