Fiberhome

Hg6245d Firmware

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:30

An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to crash the telnet daemon by sending a certain 0a 65 6e 61 62 6c 65 0a 02 0a 1a 0a string.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:29

An issue was discovered on FiberHome HG6245D devices through RP2613. Some passwords are stored in cleartext in nvram.

Exploit
  • EPSS 0.1%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:29

An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server.

Exploit
  • EPSS 0.07%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_5g.cfg has cleartext passwords and 0644 permissions.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. wifictl_2g.cfg has cleartext passwords and 0644 permissions.

Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. wifi_custom.cfg has cleartext passwords and 0644 permissions.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. There is a telnet?enable=0&key=calculated(BR0_MAC) backdoor API, without authentication, provided by the HTTP server. This will remove firewall rules and allow an attacker to reach ...

Exploit
  • EPSS 0.64%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.

Exploit
  • EPSS 0.08%
  • Veröffentlicht 10.02.2021 19:15:15
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to start a Linux telnetd as root on port 26/tcp by using the CLI interface commands of ddd and shell (or tshell).

Exploit
  • EPSS 0.7%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:26

An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / 888888 credentials for an ISP.