Description
An issue was discovered on FiberHome User End Routers Bearing Model Number AN1020-25 which could allow an attacker to easily restore a router to its factory settings by simply browsing to the link http://[Default-Router-IP]/restoreinfo.cgi & execute it. Due to improper authentication on this page, the software accepts the request hence allowing attacker to reset the router to its default configurations which later could allow attacker to login to router by using default username/password.
Published: 2017-09-07
Score: 9.8 Critical
EPSS: 73.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Fiberhome Adsl An1020-25 Adsl An1020-25 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T19:20:40.676Z

Reserved: 2017-09-05T00:00:00.000Z

Link: CVE-2017-14147

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-09-07T14:29:00.290

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-14147

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses