Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly other versions allows unauthenticated attackers to change the administrator password via a crafted POST request to sysAccess.asp. This allows full administrative control of the router without authentication.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 25 Sep 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Aztech
Aztech dsl5005en |
|
Vendors & Products |
Aztech
Aztech dsl5005en |
Wed, 24 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Aztech DSL5005EN firmware 1.00.AZ_2013-05-10 and possibly other versions allows unauthenticated attackers to change the administrator password via a crafted POST request to sysAccess.asp. This allows full administrative control of the router without authentication. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-24T17:57:30.166Z
Reserved: 2025-08-16T00:00:00.000Z
Link: CVE-2025-56241

No data.

Status : Received
Published: 2025-09-24T18:15:38.200
Modified: 2025-09-24T18:15:38.200
Link: CVE-2025-56241

No data.

Updated: 2025-09-25T08:22:01Z