Vulnerabilities > CVE-2004-1540 - Unspecified vulnerability in Zyxel Prestige and Zynos

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
zyxel
nessus
exploit available

Summary

ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.

Exploit-Db

descriptionZyXEL 3 Prestige Router HTTP Remote Administration Configuration Reset Vulnerability. CVE-2004-1540. Remote exploit for hardware platform
idEDB-ID:24760
last seen2016-02-02
modified2004-11-22
published2004-11-22
reporterFrancisco Canela
sourcehttps://www.exploit-db.com/download/24760/
titleZyXEL 3 Prestige Router HTTP Remote Administration Configuration Reset Vulnerability

Nessus

NASL familyMisc.
NASL idZYXEL_HTTP_CONFIG_RESET.NASL
descriptionThe remote host is a ZyXEL router with a vulnerability in its web interface. With HTTP Remote Administration enabled, the page
last seen2020-06-01
modified2020-06-02
plugin id15781
published2004-11-22
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15781
titleZyXEL Prestige Router Configuration Reset
code
#
# (C) Tenable Network Security
#

include("compat.inc");

if(description)
{
   script_id(15781);
   script_cve_id("CVE-2004-1540");
   script_bugtraq_id(11723);
   script_xref(name:"Secunia", value:"13278");
   script_version ("1.20");
   
   script_name(english:"ZyXEL Prestige Router Configuration Reset");
   script_summary(english:"Tries to access an unrestricted admin webpage");

   script_set_attribute(   attribute:"synopsis",   value:
"The remote host is a router with a web vulnerability that allows
a remote attacker to reset its configuration to factory defaults."   );
   script_set_attribute(   attribute:"description",    value:
"The remote host is a ZyXEL router with a vulnerability in its web
interface.  With HTTP Remote Administration enabled, the page
'/rpFWUpload.html' does not require authentication. This allows an
attacker to reset the router's configuration to its factory state."   );
   script_set_attribute(
     attribute:"see_also",
     value:"https://seclists.org/bugtraq/2004/Nov/280"
   );
   script_set_attribute(
     attribute:"solution", 
     value:"Contact ZyXEL for a patch."
   );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/21");
 script_cvs_date("Date: 2018/11/15 20:50:24");
   script_set_attribute(attribute:"plugin_type", value:"remote");
   script_end_attributes();

   script_category(ACT_GATHER_INFO);
   script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
   script_family(english:"Misc.");
   script_dependencie("http_version.nasl");
   script_require_ports(80);

   exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ( "ZyXEL-RomPager" >!< banner ) exit(0);

r = http_send_recv3(method:"GET", item:"/fpFWUpload.html", port:port);
if (isnull(r)) exit(0);
res = r[2];
if ( egrep(pattern:'<INPUT TYPE="BUTTON" NAME="ResetDefault" VALUE=".*" onClick="ConfirmDefault()"></div></td></tr><tr>', string:res ) )
	security_warning(port);