Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Advisories
Source ID Title
EUVD EUVD EUVD-2016-1492 Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T03:14:42.857Z

Reserved: 2017-03-29T00:00:00

Link: CVE-2016-10307

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-03-30T07:59:00.220

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-10307

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.