lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 2 Sep 2020 19:59:43 +0530 From: CSW Research Lab <disclose@...ersecurityworks.com> To: fulldisclosure@...lists.org Subject: [FD] Full Disclosure - Telnet Hardcoded credentials - CVE-2018-20432 *Title*: Telnet Hardcoded Credentials *Summary*: The latest versions of the firmware have hardcoded default credentials that can be exploited by an unauthenticated attacker to gain privileged access to the firmware and to extract sensitive data *Affected Firmware:* COVR-3902_REVA_ROUTER_FIRMWARE_v1.01B0 *CVE:* CVE-2018-20432 *Proof of Concept: * Step 1: “cat ./etc/init0.d/S80telnetd.sh” to get a username Step 2: “cat ./etc/config/image_sign” to get a password. Username: Alphanetworks Password: wrgac61_dlink.2015_dir883 ---------- Cheers !!! Team CSW Research Lab <http://www.cybersecurityworks.com> _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/