First published: Fri Dec 31 2004(Updated: )
ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZyXEL Prestige | =645r_a1 | |
ZyXEL Prestige | =650h | |
ZyXEL Prestige | =650hw | |
ZyXEL Prestige | =650hw_31 | |
ZyXEL Prestige | =650r | |
ZyXEL ZyNOS firmware | =3.40 | |
ZyXEL ZyNOS firmware | =is.3 | |
ZyXEL ZyNOS firmware | =is.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1540 has a critical severity level due to the lack of authentication allowing unauthorized access to router configurations.
To fix CVE-2004-1540, disable HTTP remote administration on affected ZyXEL Prestige routers.
CVE-2004-1540 affects various ZyXEL Prestige and Zynos routers with HTTP remote administration enabled.
Yes, CVE-2004-1540 can be exploited remotely without authentication, allowing attackers to alter router settings.
If using an affected version, immediately apply security best practices by disabling remote administration and securing your network.