Description
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-18826 | Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T15:49:07.326Z
Reserved: 2020-09-30T00:00:00.000Z
Link: CVE-2020-26201
No data.
Status : Modified
Published: 2020-12-10T23:15:12.583
Modified: 2024-11-21T05:19:31.117
Link: CVE-2020-26201
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD