Arris Touchstone Telephony Gateway TG1682G 9.1.103J6 devices are distributed by some ISPs with a default password of "password" for the admin account that is used over an unencrypted http://192.168.0.1 connection, which might allow remote attackers to bypass intended access restrictions by leveraging access to the local network. NOTE: one or more user's guides distributed by ISPs state "At a minimum, you should set a login password."
References
Link | Resource |
---|---|
https://medium.com/@AkshaySharmaUS/comcast-arris-touchstone-gateway-devices-are-vulnerable-heres-the-disclosure-7d603aa9342c | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-05-14 07:29
Updated : 2021-09-13 04:32
NVD link : CVE-2018-10989
Mitre link : CVE-2018-10989
JSON object : View
CWE
CWE-1188
Insecure Default Initialization of Resource
Products Affected
commscope
- arris_tg1682g_firmware
- arris_tg1682g