ID
VAR-201210-0629
TITLE
BigPond Wireless Broadband Gateway Built-in Account Permission Vulnerability
Trust: 0.6
DESCRIPTION
BigPond Wireless Broadband Gateway has an undocumented account \"Monitor\" with a default password of \"bigpond1\", which allows an attacker to exploit the vulnerability to gain access to the web server. The BigPond Wireless Broadband Gateway is a wireless broadband gateway. BigPond Wireless Broadband Gateway \"ping.cgi\" script has an input validation error. Allows an attacker to submit a specially crafted HTTP GET request to inject any SHELL command. Exploiting these issues could allow a remote attacker to bypass authentication or execute arbitrary commands in the context of the affected device. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: BigPond Wireless Broadband Gateway 3G21WB Undocumented Account and Command Injection SECUNIA ADVISORY ID: SA50951 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50951/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50951 RELEASE DATE: 2012-10-12 DISCUSS ADVISORY: http://secunia.com/advisories/50951/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50951/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50951 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Roberto Paleari has reported two security issues in BigPond Wireless Broadband Gateway 3G21WB, which can be exploited by malicious people to bypass certain security restrictions and compromise a vulnerable device. SOLUTION: No official solution is currently available. PROVIDED AND/OR DISCOVERED BY: Roberto Paleari ORIGINAL ADVISORY: http://archives.neohapsis.com/archives/bugtraq/2012-10/0072.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------
Trust: 1.44
IOT TAXONOMY
| category: | ['Network device'] | sub_category: | - | Trust: 1.2 |
AFFECTED PRODUCTS
| vendor: | netcomm | model: | bigpond wireless broadband gateway 3g21wb | scope: | - | version: | - | Trust: 1.2 |
THREAT TYPE
remote
Trust: 0.6
TYPE
Unknown
Trust: 0.3
EXTERNAL IDS
| db: | BID | id: | 55907 | Trust: 2.1 |
| db: | SECUNIA | id: | 50951 | Trust: 1.3 |
| db: | CNVD | id: | CNVD-2012-5783 | Trust: 0.6 |
| db: | CNVD | id: | CNVD-2012-5782 | Trust: 0.6 |
| db: | CNNVD | id: | CNNVD-201210-431 | Trust: 0.6 |
| db: | PACKETSTORM | id: | 117340 | Trust: 0.1 |
REFERENCES
| url: | http://secunia.com/advisories/50951/http | Trust: 1.2 |
| url: | http://www.securityfocus.com/bid/55907 | Trust: 0.6 |
| url: | http://secunia.com/vulnerability_intelligence/ | Trust: 0.1 |
| url: | http://secunia.com/advisories/secunia_security_advisories/ | Trust: 0.1 |
| url: | http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ | Trust: 0.1 |
| url: | http://secunia.com/advisories/50951/#comments | Trust: 0.1 |
| url: | https://ca.secunia.com/?page=viewadvisory&vuln_id=50951 | Trust: 0.1 |
| url: | http://secunia.com/vulnerability_scanning/personal/ | Trust: 0.1 |
| url: | http://archives.neohapsis.com/archives/bugtraq/2012-10/0072.html | Trust: 0.1 |
| url: | http://secunia.com/advisories/50951/ | Trust: 0.1 |
| url: | http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org | Trust: 0.1 |
| url: | http://secunia.com/blog/325/ | Trust: 0.1 |
| url: | http://secunia.com/advisories/about_secunia_advisories/ | Trust: 0.1 |
CREDITS
Roberto Paleari
Trust: 0.9
SOURCES
| db: | CNVD | id: | CNVD-2012-5783 |
| db: | CNVD | id: | CNVD-2012-5782 |
| db: | BID | id: | 55907 |
| db: | PACKETSTORM | id: | 117340 |
| db: | CNNVD | id: | CNNVD-201210-431 |
LAST UPDATE DATE
2022-05-17T22:47:47.872000+00:00
SOURCES UPDATE DATE
| db: | CNVD | id: | CNVD-2012-5783 | date: | 2012-10-16T00:00:00 |
| db: | CNVD | id: | CNVD-2012-5782 | date: | 2012-10-16T00:00:00 |
| db: | BID | id: | 55907 | date: | 2012-10-12T00:00:00 |
| db: | CNNVD | id: | CNNVD-201210-431 | date: | 2012-10-19T00:00:00 |
SOURCES RELEASE DATE
| db: | CNVD | id: | CNVD-2012-5783 | date: | 2012-10-16T00:00:00 |
| db: | CNVD | id: | CNVD-2012-5782 | date: | 2012-10-16T00:00:00 |
| db: | BID | id: | 55907 | date: | 2012-10-12T00:00:00 |
| db: | PACKETSTORM | id: | 117340 | date: | 2012-10-12T03:38:20 |
| db: | CNNVD | id: | CNNVD-201210-431 | date: | 2012-10-19T00:00:00 |