Vulnerabilities > CVE-2016-10401 - Credentials Management vulnerability in Zyxel Pk5001Z Firmware

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
zyxel
CWE-255
exploit available

Summary

ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).

Vulnerable Configurations

Part Description Count
OS
Zyxel
1
Hardware
Zyxel
1

Common Weakness Enumeration (CWE)

Exploit-Db

descriptionZyXEL PK5001Z Modem - Backdoor Account. CVE-2016-10401. Remote exploit for Hardware platform
fileexploits/hardware/remote/43105.txt
idEDB-ID:43105
last seen2017-11-01
modified2017-10-31
platformhardware
port
published2017-10-31
reporterExploit-DB
sourcehttps://www.exploit-db.com/download/43105/
titleZyXEL PK5001Z Modem - Backdoor Account
typeremote

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/144851/zyxelpk5001z-backdoor.txt
idPACKETSTORM:144851
last seen2017-11-03
published2017-11-02
reporterMatthew Sheimo
sourcehttps://packetstormsecurity.com/files/144851/ZyXEL-PK5001Z-Modem-Backdoor-Account.html
titleZyXEL PK5001Z Modem Backdoor Account

The Hacker News

idTHN:B9EAC52AD9207F731418E005089C2AF5
last seen2018-01-27
modified2017-11-28
published2017-11-28
reporterSwati Khandelwal
sourcehttps://thehackernews.com/2017/11/mirai-botnet-zyxel.html
titleNew Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina