Vulnerabilities > Zyxel > Prestige 660 > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2008-03-26 | CVE-2008-1527 | Cryptographic Issues vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660, P-661, and P-662 models with firmware 3.40(PE9) and 3.40(AGD.2) through 3.40(AHQ.3), support authentication over HTTP via a hash string in the hiddenPassword field, which allows remote attackers to obtain access via a replay attack. | 7.5 |
2008-03-26 | CVE-2008-1524 | Configuration vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page. | 7.5 |
2008-03-26 | CVE-2008-1522 | Configuration vulnerability in Zyxel Prestige 660, Prestige 661 and Zynos ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), have (1) "user" as their default password for the "user" account and (2) "1234" as their default password for the "admin" account, which makes it easier for remote attackers to obtain access. | 7.5 |