First published: Tue Jul 25 2017(Updated: )
ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel Pk5001z Firmware | ||
ZyXEL PK5001Z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10401 is classified as a high severity vulnerability due to the potential for remote attackers to gain root access.
To fix CVE-2016-10401, you should change the default superuser password and ensure all accounts have strong, unique passwords.
CVE-2016-10401 affects ZyXEL PK5001Z devices running the vulnerable firmware.
If CVE-2016-10401 is exploited, attackers can obtain root access to the device, potentially compromising the network.
A potential workaround for CVE-2016-10401 is to disable remote management features on your ZyXEL PK5001Z device.