Vulnerability CVE-2017-3216


Published: 2017-06-19   Modified: 2017-06-20

Description:
WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request.

Type:

CWE-306

(Missing Authentication for Critical Function)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Zyxel -> Max308m fimware 
Zyxel -> Max338m firmware 
Zyxel -> Max218m firmware 
Zyxel -> Max318m firmware 
Zyxel -> Max218mw firmware 
Zyxel -> Max218m1w firmware 
ZTEO -> X-330p firmware 
ZTE -> Ox-330p firmware 
MADA -> Soho wireless router firmware 
Huawei -> Hes-309m firmware 
Huawei -> Hes-339m firmware 
Huawei -> Bm2022 firmware 
Huawei -> Hes-319m2w firmware 
Huawei -> Hes-319m firmware 
Greenpacket -> Ox350 firmware 

 References:
http://blog.sec-consult.com/2017/06/ghosts-from-past-authentication-bypass.html
http://www.kb.cert.org/vuls/id/350135
https://sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170607-0_Various_WiMAX_CPEs_Authentication_Bypass_v10.txt

Copyright 2024, cxsecurity.com

 

Back to Top