The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
References
| Link | Resource |
|---|---|
| http://seclists.org/fulldisclosure/2015/Oct/57 | Exploit Mailing List Third Party Advisory |
| https://www.exploit-db.com/exploits/38453/ | Exploit Third Party Advisory VDB Entry |
| http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Information
Published : 2019-11-21 14:15
Updated : 2019-12-04 12:25
NVD link : CVE-2014-8356
Mitre link : CVE-2014-8356
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
dasanzhone
- znid_2426a_firmware
- znid_2426a


