ID

VAR-201312-0604


TITLE

ZyXEL GS1510-16 webctrl.cgi verifies bypassing sensitive information to obtain vulnerabilities

Trust: 0.6

sources: CNVD: CNVD-2013-14907

DESCRIPTION

ZyXEL GS1510-16 intelligent super fast Ethernet switch. ZyXEL GS1510-16 Web-Managed 16-Port Gigabit Ethernet Switch fails to properly restrict access to the webctrl.cgi script, allowing remote attackers to exploit the vulnerability to obtain administrator password information.

Trust: 0.6

sources: CNVD: CNVD-2013-14907

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-14907

AFFECTED PRODUCTS

vendor:zyxelmodel:gs1510-16scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2013-14907

CVSS

SEVERITY

CVSSV2

CVSSV3

CNVD: CNVD-2013-14907
value: MEDIUM

Trust: 0.6

CNVD: CNVD-2013-14907
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-14907

EXTERNAL IDS

db:CNVDid:CNVD-2013-14907

Trust: 0.6

sources: CNVD: CNVD-2013-14907

REFERENCES

url:https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/http/zyxel_admin_password_extractor.rb

Trust: 0.6

url:https://github.com/rapid7/metasploit-framework/pull/2709

Trust: 0.6

sources: CNVD: CNVD-2013-14907

SOURCES

db:CNVDid:CNVD-2013-14907

LAST UPDATE DATE

2022-05-04T09:34:59.689000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-14907date:2013-12-06T00:00:00

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-14907date:2013-12-06T00:00:00