Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/69811 | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoS-Broken-Session-Management.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/533489/100/0/threaded |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Information
Published : 2018-01-12 09:29
Updated : 2018-10-09 12:51
NVD link : CVE-2014-6436
Mitre link : CVE-2014-6436
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
aztech
- dsl705e
- dsl705e_firmware
- dsl705eu_firmware
- dsl705eu
- adsl_dsl5018en_\(1t1r\)
- adsl_dsl5018en_\(1t1r\)_firmware