First published: Thu Jun 21 2018(Updated: )
Telesquare SDT-CS3B1 and SDT-CW3B1 devices through 1.2.0 have a default factory account. Remote attackers can obtain access to the device via TELNET using a hardcoded account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telesquare SDT-CS3B1 Firmware | <=1.2.0 | |
Telesquare SDT-CS3B1 Firmware | ||
Telesquare SDT-CW3B1 Firmware | <=1.2.0 | |
Telesquare SDT-CW3B1 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12526 is rated as having a high severity due to the presence of a default factory account that can be exploited remotely.
To fix CVE-2018-12526, ensure that the default factory account is disabled and strong, unique credentials are set for device access.
CVE-2018-12526 affects Telesquare SDT-CS3B1 and SDT-CW3B1 devices running firmware version 1.2.0 or earlier.
Yes, CVE-2018-12526 can be exploited remotely through TELNET by attackers using the hardcoded factory account.
The potential risks include unauthorized access to the device, compromising network security, and performing malicious activities.