CVE-2017-2236

Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges.
References
Link Resource
http://jvn.jp/en/jp/JVN85901441/index.html Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:toshiba:hem-gw16a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:toshiba:hem-gw16a:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:toshiba:hem-gw26a_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:toshiba:hem-gw26a:-:*:*:*:*:*:*:*

Information

Published : 2017-07-07 06:29

Updated : 2017-07-14 07:54


NVD link : CVE-2017-2236

Mitre link : CVE-2017-2236


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

toshiba

  • hem-gw26a
  • hem-gw16a
  • hem-gw26a_firmware
  • hem-gw16a_firmware