ID

VAR-E-201311-0198


TITLE

ZyXEL GS1510-16 'webctrl.cgi' Remote Password Disclosure Vulnerability

Trust: 0.3

sources: BID: 64646

DESCRIPTION

ZyXEL GS1510-16 is prone to a password-disclosure vulnerability.
Attackers can exploit this issue to gain access to administrator password that may lead to further attacks.

Trust: 0.3

sources: BID: 64646

AFFECTED PRODUCTS

vendor:zyxelmodel:gs1510-16scope:eqversion:0

Trust: 0.3

sources: BID: 64646

EXPLOIT

Attackers can exploit this issue using browser or readily available tools.
The following metasploit exploit code is available:
Bullet list:
<li><a href="/data/vulnerabilities/exploits/64646.rb">/data/vulnerabilities/exploits/64646.rb</a></li>

Trust: 0.3

sources: BID: 64646

PRICE

Free

Trust: 0.3

sources: BID: 64646

TYPE

Design Error

Trust: 0.3

sources: BID: 64646

CREDITS

Daniel Manser and Sven Vetsch

Trust: 0.3

sources: BID: 64646

EXTERNAL IDS

db:BIDid:64646

Trust: 0.3

sources: BID: 64646

REFERENCES

url:http://www.zyxel.com/in/en/news/press_room_20101206_612871.shtml

Trust: 0.3

url:https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/zyxel_admin_password_extractor.rb

Trust: 0.3

url:https://github.com/rapid7/metasploit-framework/pull/2709

Trust: 0.3

sources: BID: 64646

SOURCES

db:BIDid:64646

LAST UPDATE DATE

2022-07-27T09:56:38.862000+00:00


SOURCES UPDATE DATE

db:BIDid:64646date:2013-11-29T00:00:00

SOURCES RELEASE DATE

db:BIDid:64646date:2013-11-29T00:00:00