First published: Tue Feb 04 2014(Updated: )
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZTE ZXV10 W300 Firmware | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0329 is classified as a high-severity vulnerability due to the presence of hardcoded credentials that can be exploited for unauthorized administrative access.
To mitigate CVE-2014-0329, users should disable the TELNET service and utilize secure alternatives for remote management if possible.
CVE-2014-0329 affects users of the ZTE ZXV10 W300 router running version 2.1.0.
The impact of CVE-2014-0329 allows remote attackers to gain administrative access to the router, potentially compromising the network.
Attackers can exploit CVE-2014-0329 by leveraging the knowledge of the MAC address characters to obtain the hardcoded password for the admin account.