Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE network
low complexity
zyxel
nessus
exploit available
Published: 2004-12-31
Updated: 2017-07-11
Summary
ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.
Vulnerable Configurations
Part | Description | Count |
Hardware | Zyxel | 8 |
Exploit-Db
description | ZyXEL 3 Prestige Router HTTP Remote Administration Configuration Reset Vulnerability. CVE-2004-1540. Remote exploit for hardware platform |
id | EDB-ID:24760 |
last seen | 2016-02-02 |
modified | 2004-11-22 |
published | 2004-11-22 |
reporter | Francisco Canela |
source | https://www.exploit-db.com/download/24760/ |
title | ZyXEL 3 Prestige Router HTTP Remote Administration Configuration Reset Vulnerability |
Nessus
NASL family | Misc. |
NASL id | ZYXEL_HTTP_CONFIG_RESET.NASL |
description | The remote host is a ZyXEL router with a vulnerability in its web interface. With HTTP Remote Administration enabled, the page |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15781 |
published | 2004-11-22 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15781 |
title | ZyXEL Prestige Router Configuration Reset |
code | #
# (C) Tenable Network Security
#
include("compat.inc");
if(description)
{
script_id(15781);
script_cve_id("CVE-2004-1540");
script_bugtraq_id(11723);
script_xref(name:"Secunia", value:"13278");
script_version ("1.20");
script_name(english:"ZyXEL Prestige Router Configuration Reset");
script_summary(english:"Tries to access an unrestricted admin webpage");
script_set_attribute( attribute:"synopsis", value:
"The remote host is a router with a web vulnerability that allows
a remote attacker to reset its configuration to factory defaults." );
script_set_attribute( attribute:"description", value:
"The remote host is a ZyXEL router with a vulnerability in its web
interface. With HTTP Remote Administration enabled, the page
'/rpFWUpload.html' does not require authentication. This allows an
attacker to reset the router's configuration to its factory state." );
script_set_attribute(
attribute:"see_also",
value:"https://seclists.org/bugtraq/2004/Nov/280"
);
script_set_attribute(
attribute:"solution",
value:"Contact ZyXEL for a patch."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/22");
script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/21");
script_cvs_date("Date: 2018/11/15 20:50:24");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
script_family(english:"Misc.");
script_dependencie("http_version.nasl");
script_require_ports(80);
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:80);
banner = get_http_banner(port:port);
if ( "ZyXEL-RomPager" >!< banner ) exit(0);
r = http_send_recv3(method:"GET", item:"/fpFWUpload.html", port:port);
if (isnull(r)) exit(0);
res = r[2];
if ( egrep(pattern:'<INPUT TYPE="BUTTON" NAME="ResetDefault" VALUE=".*" onClick="ConfirmDefault()"></div></td></tr><tr>', string:res ) )
security_warning(port);
|