Vulnerabilities > CVE-2014-0329 - Credentials Management vulnerability in ZTE Zxv10 W300 2.1.0
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Hardware | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | ZTE ZXV10 W300 Router - Hardcoded Credentials. CVE-2014-0329. Webapps exploit for hardware platform |
id | EDB-ID:31527 |
last seen | 2016-02-03 |
modified | 2014-02-09 |
published | 2014-02-09 |
reporter | Cesar Neira |
source | https://www.exploit-db.com/download/31527/ |
title | ZTE ZXV10 W300 Router - Hardcoded Credentials |
Nessus
NASL family | Misc. |
NASL id | ZTE_ZXV10_BACKDOOR.NASL |
description | Nessus was able to login to the remote device using a known hard-coded password (prepended with a portion of the device |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 72813 |
published | 2014-03-05 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/72813 |
title | ZTE ZXV10 W300 Wireless Router Hard-coded Password |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/125142/zte-creds.txt |
id | PACKETSTORM:125142 |
last seen | 2016-12-05 |
published | 2014-02-09 |
reporter | Cesar Neira |
source | https://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html |
title | ZTE ZXV10 W300 Hardcoded Credentials |
Seebug
bulletinFamily exploit description CVE ID:CVE-2014-0329 ZTE ZXV10 W300 Router是中国中兴通讯(ZTE)公司的一款无线路由器产品。 ZTE ZXV10 W300路由器2.1.0版本上的TELNET服务中存在安全漏洞,该漏洞源于程序安装使用默认的硬编码凭证,将admin帐户密码‘XXXXairocon’中的前四位设置为MAC地址后四位。远程攻击者可通过已知的密码利用该漏洞获取管理访问权限。 0 ZTE ZXV10 W300 Router 厂商补丁: ZTE ----- 目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://wwwen.zte.com.cn/en/products/access/cpe/201302/t20130204_386351.html id SSV:61413 last seen 2017-11-19 modified 2014-02-11 published 2014-02-11 reporter Root source https://www.seebug.org/vuldb/ssvid-61413 title ZTE ZXV10 W300 Router信任管理漏洞 bulletinFamily exploit description No description provided by source. id SSV:84851 last seen 2017-11-19 modified 2014-07-01 published 2014-07-01 reporter Root source https://www.seebug.org/vuldb/ssvid-84851 title ZTE ZXV10 W300 Router - Hardcoded Credentials
Statements
contributor | a representative |
lastmodified | 2014-03-13 |
organization | ZTE |
statement | According to the vulnerability found in ZTE ZXV10 W300 router version 2.1.0, a mitigation measure has been adopted in the W300 general frame structure versions after 2011, which means the ZTE ZXV10 W300 router produced since 2011 has closed the telnet default function to avoid the information security incident caused by such vulnerability. If any customer has a special requirement, please follow the instructions in our product manual to open the telnet function, but ZTE will not bear the legal liability for any security incident loss that might be the consequence of this operation. If you have any questions please contact us by calling our 24h service hotline +86-755-26770188. |
References
- http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html
- http://osvdb.org/102816
- http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html
- http://www.kb.cert.org/vuls/id/228886
- http://www.securityfocus.com/bid/65310
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90958