Description
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Published: 2017-03-30
Score: 9.8 Critical
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2016-1492 Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
History

No history.

Subscriptions

Gotrango Apex Lynx Apex Lynx Firmware Apex Orion Apex Orion Firmware Giga Lynx Giga Lynx Firmware Giga Orion Giga Orion Firmware Stratalink Stratalink Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:14:42.857Z

Reserved: 2017-03-29T00:00:00.000Z

Link: CVE-2016-10307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-03-30T07:59:00.220

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-10307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses