Description
Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.
Published: 2019-01-09
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-8054 Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier uses hard-coded credentials, which may allow an attacker on the same network segment to login to the administrators settings screen and change the configuration or execute arbitrary OS commands.
History

No history.

Subscriptions

Toshiba Hem-gw16a Hem-gw16a Firmware Hem-gw26a Hem-gw26a Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: jpcert

Published:

Updated: 2024-08-05T10:17:38.280Z

Reserved: 2018-08-30T00:00:00.000Z

Link: CVE-2018-16201

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-01-09T23:29:04.887

Modified: 2024-11-21T03:52:16.877

Link: CVE-2018-16201

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses