Actiontec

Web6000q Firmware

3 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.16%
  • Published 28.06.2019 15:15:09
  • Last modified 21.11.2024 03:51:03

On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.

Exploit
  • EPSS 2.54%
  • Published 27.06.2019 17:15:11
  • Last modified 21.11.2024 03:51:03

The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.

Exploit
  • EPSS 2.92%
  • Published 27.06.2019 17:15:11
  • Last modified 21.11.2024 03:51:03

An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 w...