First published: Tue Aug 14 2001(Updated: )
ZyXEL Prestige 642R and 642R-I routers do not filter the routers' Telnet and FTP ports on the external WAN interface from inside access, allowing someone on an internal computer to reconfigure the router, if the password is known.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZyXEL Prestige | =642r |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1135 is considered a high severity vulnerability due to its potential for unauthorized access and configuration changes.
To fix CVE-2001-1135, it is recommended to either change the default passwords and ensure network segmentation or upgrade the firmware of the ZyXEL Prestige 642R router.
CVE-2001-1135 specifically affects the ZyXEL Prestige 642R and 642R-I router models.
Yes, CVE-2001-1135 can be exploited from an internal network, allowing attackers with internal access to reconfigure the router if they know the password.
While CVE-2001-1135 is an older vulnerability, it remains a concern for organizations using these outdated router models without proper security measures.