All ADB broadband gateways / routers based on the Epicentro platform are affected by an authorization bypass vulnerability where attackers are able to access and manipulate settings within the web interface that are forbidden to end users (e.g., by the ISP). An attacker would be able to enable the TELNET server or other settings as well.
References
Link | Resource |
---|---|
https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/ | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2018/Jul/18 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html | Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/44982/ | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/542119/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2018-07-06 07:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-13109
Mitre link : CVE-2018-13109
JSON object : View
CWE
CWE-863
Incorrect Authorization
Products Affected
adbglobal
- vv2220_firmware
- vv5522_firmware
- vv2220
- dv2210
- dv2210_firmware
- vv5522
- prg_av4202n
- prg_av4202n_firmware