Description
Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-11419 | Toshiba Home gateway HEM-GW16A firmware HEM-GW16A-FW-V1.2.0 and earlier, Toshiba Home gateway HEM-GW26A firmware HEM-GW26A-FW-V1.2.0 and earlier uses hard-coded credentials, which may allow attackers to perform operations on device with administrative privileges. |
References
| Link | Providers |
|---|---|
| http://jvn.jp/en/jp/JVN85901441/index.html |
|
History
No history.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2024-08-05T13:48:05.063Z
Reserved: 2016-12-01T00:00:00.000Z
Link: CVE-2017-2236
No data.
Status : Deferred
Published: 2017-07-07T13:29:01.270
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-2236
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD