Description
Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-8054 | Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands. |
References
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-05T10:17:38.280Z
Reserved: 2018-08-30T00:00:00.000Z
Link: CVE-2018-16201
No data.
Status : Modified
Published: 2019-01-09T23:29:04.887
Modified: 2024-11-21T03:52:16.877
Link: CVE-2018-16201
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD