Vulnerabilities > CVE-2001-1135 - Unspecified vulnerability in Zyxel Prestige 642R
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN zyxel
nessus
Summary
ZyXEL Prestige 642R and 642R-I routers do not filter the routers' Telnet and FTP ports on the external WAN interface from inside access, allowing someone on an internal computer to reconfigure the router, if the password is known.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 1 |
Nessus
NASL family | Misc. |
NASL id | ZYXEL_HTTP_PWD.NASL |
description | The remote host is a ZyXEL router with a default password set. An attacker could connect to the web interface and reconfigure it. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 17304 |
published | 2005-03-10 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/17304 |
title | ZyXEL Routers Default Web Account |
code |
|
References
- http://www.securityfocus.com/archive/1/203022
- http://www.securityfocus.com/archive/1/203022
- http://www.securityfocus.com/archive/1/203592
- http://www.securityfocus.com/archive/1/203592
- http://www.securityfocus.com/archive/1/204439
- http://www.securityfocus.com/archive/1/204439
- http://www.securityfocus.com/archive/1/214971
- http://www.securityfocus.com/archive/1/214971
- http://www.securityfocus.com/bid/3346
- http://www.securityfocus.com/bid/3346
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7146
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7146