Description
An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-6723 | An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console. |
References
History
No history.
Subscriptions
Zyxel
Subscribe
Gs1900-10hp
Subscribe
Gs1900-10hp Firmware
Subscribe
Gs1900-16
Subscribe
Gs1900-16 Firmware
Subscribe
Gs1900-24
Subscribe
Gs1900-24 Firmware
Subscribe
Gs1900-24e
Subscribe
Gs1900-24e Firmware
Subscribe
Gs1900-24hp
Subscribe
Gs1900-24hp Firmware
Subscribe
Gs1900-48
Subscribe
Gs1900-48 Firmware
Subscribe
Gs1900-48hp
Subscribe
Gs1900-48hp Firmware
Subscribe
Gs1900-8
Subscribe
Gs1900-8 Firmware
Subscribe
Gs1900-8hp
Subscribe
Gs1900-8hp Firmware
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:56:22.466Z
Reserved: 2019-08-29T00:00:00.000Z
Link: CVE-2019-15804
No data.
Status : Modified
Published: 2019-11-14T21:15:11.953
Modified: 2024-11-21T04:29:30.103
Link: CVE-2019-15804
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD