Impact
The firmware for Siklu EtherHaul 8010 devices contains a hard‑coded root password, allowing anyone who discovers or guesses this credential to gain privileged control. This can lead to configuration changes, malware installation, and eventual compromise of the device’s integrity and availability, affecting the confidentiality, integrity, and availability of networks that rely on the unit.
Affected Systems
All Siklu EtherHaul 8010 devices running the current firmware build are affected. Specific firmware version information was not provided, so the vulnerability likely applies to any device that has not yet been updated beyond the referenced build.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity. Since no EPSS data is available and the issue is not listed in CISA’s KEV catalog, it is not a known widely exploited vulnerability. Nonetheless, the presence of a static root password presents a low‑barrier privilege escalation path, especially if the device is reachable over a network or to an attacker with physical access. The likely attack vector, inferred from the description, is a login attempt using the embedded root credentials.
OpenCVE Enrichment