First published: Wed Feb 10 2021(Updated: )
An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fiberhome Hg6245d Firmware | <=rp2613 | |
FiberHome HG6245D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27172 is critical with a score of 9.8.
We do not provide information on how to exploit vulnerabilities.
To fix CVE-2021-27172, FiberHome HG6245D devices through RP2613 firmware should be updated to a version that addresses the hardcoded GEPON password issue.
Yes, FiberHome HG6245D devices with RP2613 firmware are affected by CVE-2021-27172.
You can find more information about CVE-2021-27172 at the following reference: [CVE-2021-27172](https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#telnet-linux-hardcoded-credentials)