|  |  | 
closedb();
?>
| Vulnerability CVE-2019-12789Published: 2019-06-17
 
 
	
		| Description: |  
		| An issue was discovered on Actiontec T2200H T2200H-31.128L.08 devices, as distributed by Telus. By attaching a UART adapter to the UART pins on the system board, an attacker can use a special key sequence (Ctrl-\) to obtain a shell with root privileges. After gaining root access, the attacker can mount the filesystem read-write and make permanent modifications to the device including bricking of the device, disabling vendor management of the device, preventing automatic upgrades, and permanently installing malicious code on the device. |  See advisories in our WLB2 database:Type:|  | Topic | Author | Date |  
            | 
Med. |  | Andrew Klaus | 13.06.2019 | 
 
 CWE-264(Permissions, Privileges, and Access Controls)
				 CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)| CVSS Base Score | Impact Subscore | Exploitability Subscore |  
							| 7.2/10 | 10/10 | 3.9/10 | 
 
						| Exploit range | Attack complexity | Authentication |  
						| Local | Low | No required |  
						| Confidentiality impact | Integrity impact | Availability impact |  
						| Complete | Complete | Complete | 
 
|  References: |  
| http://seclists.org/fulldisclosure/2019/Jun/10 https://www.actiontec.com/blog/ | 
 |  |  |  Copyright 2025, cxsecurity.com
  
     |  |  |