Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.

Project Subscriptions

Vendors Products
Gotrango Subscribe
Apex Lynx Subscribe
Apex Lynx Firmware Subscribe
Apex Orion Subscribe
Apex Orion Firmware Subscribe
Giga Lynx Subscribe
Giga Lynx Firmware Subscribe
Giga Orion Subscribe
Giga Orion Firmware Subscribe
Stratalink Subscribe
Stratalink Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2016-1492 Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:14:42.857Z

Reserved: 2017-03-29T00:00:00

Link: CVE-2016-10307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-03-30T07:59:00.220

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-10307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses