Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
References
Link | Resource |
---|---|
http://blog.iancaling.com/post/153011925478 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97242 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2017-03-30 00:59
Updated : 2021-05-05 07:46
NVD link : CVE-2016-10307
Mitre link : CVE-2016-10307
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
gotrango
- giga_lynx_firmware
- giga_orion
- apex_lynx
- giga_orion_firmware
- apex_orion_firmware
- apex_lynx_firmware
- apex_orion
- stratalink_firmware
- stratalink
- giga_lynx