Fiberhome

Hg6245d Firmware

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.7%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:26

An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded useradmin / 888888 credentials for an ISP.

Exploit
  • EPSS 0.7%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:26

An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / 1234 credentials for an ISP.

Exploit
  • EPSS 0.19%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:26

An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded user / tattoo@home credentials for an ISP.

Exploit
  • EPSS 0.7%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:27

An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / tele1234 credentials for an ISP.

Exploit
  • EPSS 0.7%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:27

An issue was discovered on FiberHome HG6245D devices through RP2613. The web daemon contains the hardcoded admin / aisadmin credentials for an ISP.

Exploit
  • EPSS 0.64%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:27

An issue was discovered on FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:27

An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon.

Exploit
  • EPSS 0.64%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:27

An issue was discovered on FiberHome HG6245D devices through RP2613. There is a password of four hexadecimal characters for the admin account. These characters are generated in init_3bb_password in libci_adaptation_layer.so.

Exploit
  • EPSS 0.64%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:27

An issue was discovered on FiberHome HG6245D devices through RP2613. There is a 6GFJdY4aAuUKJjdtSn7d password for the rdsadmin account.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 10.02.2021 19:15:14
  • Zuletzt bearbeitet 21.11.2024 05:57:28

An issue was discovered on FiberHome HG6245D devices through RP2613. By default, there are no firewall rules for IPv6 connectivity, exposing the internal management interfaces to the Internet.