Description
The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-20748 | The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor. |
References
| Link | Providers |
|---|---|
| https://www.slideshare.net/secret/qrHwDOJ71eLg7f |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:17:51.468Z
Reserved: 2018-03-30T00:00:00.000Z
Link: CVE-2018-9149
No data.
Status : Modified
Published: 2018-04-01T18:29:00.287
Modified: 2024-11-21T04:15:04.850
Link: CVE-2018-9149
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD