Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2001-08-09T00:00:00", "descriptions": [{"lang": "en", "value": "ZyXEL Prestige 642R and 642R-I routers do not filter the routers' Telnet and FTP ports on the external WAN interface from inside access, allowing someone on an internal computer to reconfigure the router, if the password is known."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "20010810 Re: ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/203592"}, {"name": "prestige-wan-bypass-filter(7146)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7146"}, {"name": "20010809 ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/203022"}, {"name": "20010918 SECURITY RISK: ZyXEL ADSL Router 642R - WAN filter bypass from internal network", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/214971"}, {"name": "3346", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/3346"}, {"name": "20010814 Fwd: ZyXEL Prestige 642 Router Administration Interface Vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/204439"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-1135", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "ZyXEL Prestige 642R and 642R-I routers do not filter the routers' Telnet and FTP ports on the external WAN interface from inside access, allowing someone on an internal computer to reconfigure the router, if the password is known."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "20010810 Re: ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/203592"}, {"name": "prestige-wan-bypass-filter(7146)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7146"}, {"name": "20010809 ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/203022"}, {"name": "20010918 SECURITY RISK: ZyXEL ADSL Router 642R - WAN filter bypass from internal network", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/214971"}, {"name": "3346", "refsource": "BID", "url": "http://www.securityfocus.com/bid/3346"}, {"name": "20010814 Fwd: ZyXEL Prestige 642 Router Administration Interface Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/204439"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-08T04:44:07.881Z"}, "title": "CVE Program Container", "references": [{"name": "20010810 Re: ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/203592"}, {"name": "prestige-wan-bypass-filter(7146)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7146"}, {"name": "20010809 ZyXEL Prestige 642R: Exposed Admin Services on WAN with Default Password", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/203022"}, {"name": "20010918 SECURITY RISK: ZyXEL ADSL Router 642R - WAN filter bypass from internal network", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/214971"}, {"name": "3346", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/3346"}, {"name": "20010814 Fwd: ZyXEL Prestige 642 Router Administration Interface Vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/204439"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-1135", "datePublished": "2002-03-15T05:00:00", "dateReserved": "2002-03-15T00:00:00", "dateUpdated": "2024-08-08T04:44:07.881Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}