First published: Thu May 02 2019(Updated: )
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username true and password true, and another with the username supervisor and password zyad1234. These accounts can be used to login to the web interface, exploit authenticated command injections, and change router settings for malicious purposes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel P660HN-T1A Routers | =7.3.8.0 | |
Billion 5200W-T | ||
Zyxel P660HN-T1A Routers | =7.3.37.6 | |
Zyxel P660HN-T1A Routers | ||
Zyxel P660hn-t1a V1 Firmware | =7.3.37.6 | |
ZyXEL P660HN-T1A v1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ZyXEL router vulnerability is CVE-2017-18371.
CVE-2017-18371 has a severity rating of 9.8 (critical).
The affected software for CVE-2017-18371 includes ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 routers distributed by TrueOnline.
Yes, the ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router has three user accounts with default passwords: true/true and supervisor/zyad1234.
More information about CVE-2017-18371 can be found at the following references: [ZyXEL Support](http://www.zyxel.com/support/announcement_unauthenticated.shtml), [GitHub - PoC](https://raw.githubusercontent.com/pedrib/PoC/master/advisories/zyxel_trueonline.txt), [Full Disclosure Mailing List](https://seclists.org/fulldisclosure/2017/Jan/40).