Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
References
Link | Resource |
---|---|
https://www.reddit.com/r/verizon/comments/sstq4c/5g_home_internet_dropping_out/hx3ir0s/ | Third Party Advisory |
https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-04-02 21:15
Updated : 2022-09-09 09:49
NVD link : CVE-2022-28376
Mitre link : CVE-2022-28376
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
verizon
- lvskihp_firmware
- lvskihp