Vulnerabilities > CVE-2016-10401 - Credentials Management vulnerability in Zyxel Pk5001Z Firmware
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 | |
Hardware | 1 |
Common Weakness Enumeration (CWE)
Exploit-Db
description | ZyXEL PK5001Z Modem - Backdoor Account. CVE-2016-10401. Remote exploit for Hardware platform |
file | exploits/hardware/remote/43105.txt |
id | EDB-ID:43105 |
last seen | 2017-11-01 |
modified | 2017-10-31 |
platform | hardware |
port | |
published | 2017-10-31 |
reporter | Exploit-DB |
source | https://www.exploit-db.com/download/43105/ |
title | ZyXEL PK5001Z Modem - Backdoor Account |
type | remote |
Packetstorm
data source | https://packetstormsecurity.com/files/download/144851/zyxelpk5001z-backdoor.txt |
id | PACKETSTORM:144851 |
last seen | 2017-11-03 |
published | 2017-11-02 |
reporter | Matthew Sheimo |
source | https://packetstormsecurity.com/files/144851/ZyXEL-PK5001Z-Modem-Backdoor-Account.html |
title | ZyXEL PK5001Z Modem Backdoor Account |
The Hacker News
id | THN:B9EAC52AD9207F731418E005089C2AF5 |
last seen | 2018-01-27 |
modified | 2017-11-28 |
published | 2017-11-28 |
reporter | Swati Khandelwal |
source | https://thehackernews.com/2017/11/mirai-botnet-zyxel.html |
title | New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina |