Description
The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-20748 | The Zyxel Multy X (AC3000 Tri-Band WiFi System) device doesn't use a suitable mechanism to protect the UART. After an attacker dismantles the device and uses a USB-to-UART cable to connect the device, he can use the 1234 password for the root account to login to the system. Furthermore, an attacker can start the device's TELNET service as a backdoor. |
References
| Link | Providers |
|---|---|
| https://www.slideshare.net/secret/qrHwDOJ71eLg7f |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T07:17:51.468Z
Reserved: 2018-03-30T00:00:00.000Z
Link: CVE-2018-9149
No data.
Status : Modified
Published: 2018-04-01T18:29:00.287
Modified: 2024-11-21T04:15:04.850
Link: CVE-2018-9149
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD