Description
The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-16283 | The rpWLANRedirect.asp ASP page is accessible without authentication on ZyXEL P-660HN-T1 V2 (2.00(AAKK.3)) devices. After accessing the page, the admin user's password can be obtained by viewing the HTML source code, and the interface of the modem can be accessed as admin. |
References
| Link | Providers |
|---|---|
| https://seclists.org/bugtraq/2019/May/78 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T20:31:04.318Z
Reserved: 2019-01-23T00:00:00.000Z
Link: CVE-2019-6725
No data.
Status : Modified
Published: 2019-05-31T22:29:01.300
Modified: 2024-11-21T04:47:00.590
Link: CVE-2019-6725
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD