Askey Fiber Router RTF3505VW-N1 BR_SV_g000_R3505VWN1001_s32_7 devices allow Remote Code Execution and retrieval of admin credentials to log into the Dashboard or login via SSH, leading to code execution as root.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-21093 | Askey Fiber Router RTF3505VW-N1 BR_SV_g000_R3505VWN1001_s32_7 devices allow Remote Code Execution and retrieval of admin credentials to log into the Dashboard or login via SSH, leading to code execution as root. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cr1pt0.medium.com/cve-2020-28695-8f8d618ac0b |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:40:59.785Z
Reserved: 2020-11-16T00:00:00.000Z
Link: CVE-2020-28695
No data.
Status : Modified
Published: 2021-03-26T18:15:12.030
Modified: 2024-11-21T05:23:08.043
Link: CVE-2020-28695
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD