ID

VAR-200907-0115


CVE

CVE-2009-2274


TITLE

Huawei D100 Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2009-004781

DESCRIPTION

The Huawei D100 allows remote attackers to obtain sensitive information via a direct request to (1) lan_status_adv.asp, (2) wlan_basic_cfg.asp, or (3) lancfg.asp in en/, related to use of JavaScript to protect against reading file contents. Huawei D100 is prone to a security-bypass vulnerability and an information-disclosure vulnerability. Attackers can exploit theses issues to obtain sensitive information or gain unauthorized access and execute arbitrary commands with root privileges. D100 is the world's first WiFi adapter that connects mobile phones, game consoles, PCs and laptops together via a WiFi link. Multiple security vulnerabilities exist in the D100 firmware and its default configuration, which may allow LAN users to gain unauthorized access to the device. ---------------------------------------------------------------------- Do you have VARM strategy implemented? (Vulnerability Assessment Remediation Management) If not, then implement it through the most reliable vulnerability intelligence source on the market. Implement it through Secunia. For more information visit: http://secunia.com/advisories/business_solutions/ Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com ---------------------------------------------------------------------- TITLE: Huawei D100 Information Disclosure and Undocumented Telnet Account SECUNIA ADVISORY ID: SA35638 VERIFY ADVISORY: http://secunia.com/advisories/35638/ DESCRIPTION: Filip Palian has reported a vulnerability and a security issue in Huawei D100, which can be exploited by malicious people to disclose sensitive information or compromise a vulnerable device. 1) Access to the "en/lan_status_adv.asp", "en/wlan_basic_cfg.asp", and "en/lancfg.asp" scripts is not properly restricted. This can be exploited to disclose sensitive information by accessing the scripts directly. 2) The device contains an undocumented telnet account ("admin") with a default password ("admin"). SOLUTION: Restrict internal network access to trusted users only. PROVIDED AND/OR DISCOVERED BY: Filip Palian ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.07

sources: NVD: CVE-2009-2274 // JVNDB: JVNDB-2009-004781 // BID: 43764 // VULHUB: VHN-39720 // PACKETSTORM: 78906

AFFECTED PRODUCTS

vendor:huaweimodel:d100scope:eqversion: -

Trust: 1.6

vendor:huaweimodel:d100scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2009-004781 // CNNVD: CNNVD-200907-012 // NVD: CVE-2009-2274

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2009-2274
value: HIGH

Trust: 1.0

NVD: CVE-2009-2274
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200907-012
value: HIGH

Trust: 0.6

VULHUB: VHN-39720
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2009-2274
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-39720
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-39720 // JVNDB: JVNDB-2009-004781 // CNNVD: CNNVD-200907-012 // NVD: CVE-2009-2274

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-39720 // JVNDB: JVNDB-2009-004781 // NVD: CVE-2009-2274

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200907-012

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-200907-012

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-004781

PATCH

title:Top Pageurl:http://www.huawei.com/en/

Trust: 0.8

sources: JVNDB: JVNDB-2009-004781

EXTERNAL IDS

db:NVDid:CVE-2009-2274

Trust: 2.8

db:SECUNIAid:35638

Trust: 1.8

db:JVNDBid:JVNDB-2009-004781

Trust: 0.8

db:BUGTRAQid:20090630 MULTIPLE FLAWS IN HUAWEI D100

Trust: 0.6

db:CNNVDid:CNNVD-200907-012

Trust: 0.6

db:BIDid:43764

Trust: 0.3

db:VULHUBid:VHN-39720

Trust: 0.1

db:PACKETSTORMid:78906

Trust: 0.1

sources: VULHUB: VHN-39720 // BID: 43764 // JVNDB: JVNDB-2009-004781 // PACKETSTORM: 78906 // CNNVD: CNNVD-200907-012 // NVD: CVE-2009-2274

REFERENCES

url:http://secunia.com/advisories/35638

Trust: 1.7

url:http://www.securityfocus.com/archive/1/504645/100/0/threaded

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-2274

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-2274

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/504645/100/0/threaded

Trust: 0.6

url:http://www.huawei.com/

Trust: 0.3

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/35638/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: VULHUB: VHN-39720 // BID: 43764 // JVNDB: JVNDB-2009-004781 // PACKETSTORM: 78906 // CNNVD: CNNVD-200907-012 // NVD: CVE-2009-2274

CREDITS

Filip Palian filip.palian@pjwstk.edu.pl

Trust: 0.6

sources: CNNVD: CNNVD-200907-012

SOURCES

db:VULHUBid:VHN-39720
db:BIDid:43764
db:JVNDBid:JVNDB-2009-004781
db:PACKETSTORMid:78906
db:CNNVDid:CNNVD-200907-012
db:NVDid:CVE-2009-2274

LAST UPDATE DATE

2025-04-10T23:16:26.790000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-39720date:2018-10-10T00:00:00
db:BIDid:43764date:2015-03-19T09:25:00
db:JVNDBid:JVNDB-2009-004781date:2012-09-25T00:00:00
db:CNNVDid:CNNVD-200907-012date:2009-07-15T00:00:00
db:NVDid:CVE-2009-2274date:2025-04-09T00:30:58.490

SOURCES RELEASE DATE

db:VULHUBid:VHN-39720date:2009-07-01T00:00:00
db:BIDid:43764date:2009-07-03T00:00:00
db:JVNDBid:JVNDB-2009-004781date:2012-09-25T00:00:00
db:PACKETSTORMid:78906date:2009-07-06T09:26:51
db:CNNVDid:CNNVD-200907-012date:2009-06-30T00:00:00
db:NVDid:CVE-2009-2274date:2009-07-01T13:00:01.577