Description
Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
Published: 2020-12-10
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-18826 Askey AP5100W_Dual_SIG_1.01.097 and all prior versions use a weak password at the Operating System (rlx-linux) level. This allows an attacker to gain unauthorized access as an admin or root user to the device Operating System via Telnet or SSH.
History

No history.

Subscriptions

Askey Ap5100w Ap5100w Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T15:49:07.326Z

Reserved: 2020-09-30T00:00:00.000Z

Link: CVE-2020-26201

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-10T23:15:12.583

Modified: 2024-11-21T05:19:31.117

Link: CVE-2020-26201

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses