Siklu EtherHaul radios before 3.7.1 and 6.x before 6.9.0 have a built-in, hidden root account, with an unchangeable password that is the same across all devices. This account is accessible via both SSH and the device's web interface and grants access to the underlying embedded Linux OS on the device, allowing full control over it.
References
Link | Resource |
---|---|
http://blog.iancaling.com/post/145309944453 | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/97243 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-03-30 00:59
Updated : 2017-04-04 08:39
NVD link : CVE-2016-10308
Mitre link : CVE-2016-10308
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
siklu
- etherhaul-5500fd
- etherhaul_60ghz_v-band_radio
- etherhaul_70\/80ghz_gigabit_radio
- etherhaul_firmware
- etherhaul_70ghz_e-band_radio
- etherhaul_70\/80ghz_multi-gigabit_e-band_radio
- etherhaul_500tx