The web administrative portal in Zhone zNID 2426A before S3.0.501 allows remote authenticated users to bypass intended access restrictions via a modified server response, related to an insecure direct object reference.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2015/Oct/57 | Exploit Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/38453/ | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/133921/Zhone-Insecure-Reference-Password-Disclosure-Command-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-11-21 14:15
Updated : 2019-12-04 12:25
NVD link : CVE-2014-8356
Mitre link : CVE-2014-8356
JSON object : View
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
Products Affected
dasanzhone
- znid_2426a_firmware
- znid_2426a