![]() Improper Limitation of a Pathname to a Restricted Directory ('Path. but do stuay the firmware and u will find your. Let me see if i can do something with it. btw, the firmware is on MIPS MSB format, we did not support that for now, we only support MIPS LSB. I have check the firmware and it seems the main executable is in bin/pc, which you can find in /etc/init.norm. Permissions, Privileges, and Access Controlsįailure to Preserve Web Page Structure ('Cross-site Scripting') minanagehsalalma commented on Feb 6, 2020. ZTE ZXHN H108N R1A devices before _PE allow remote attackers to discover usernames and password hashes by reading the cgi-bin/webproc HTML source code, a different vulnerability than CVE-2015-8703. ZTE ZXHN H108N R1A devices before _PE allow remote authenticated users to bypass intended access restrictions via a modified request, as demonstrated by leveraging the support account to change a password via a cgi-bin/webproc accountpsd action. ZTE ZXHN H108N R1A devices before _PE have a hardcoded password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session.Ībsolute path traversal vulnerability in cgi-bin/webproc on ZTE ZXHN H108N R1A devices before _PE allows remote attackers to read arbitrary files via a full pathname in the getpage parameter. ![]() ![]() ZTE ZXHN H108N R1A devices before _PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248.Ĭross-site scripting (XSS) vulnerability in cgi-bin/webproc on ZTE ZXHN H108N R1A devices before _PE allows remote attackers to inject arbitrary web script or HTML via the errorpage parameter. COMMON PLATFORM ENUMERATION: Repartition per Version CPE NameĬpe:2.3:o:zte:zxhn_h108n_r1a_firmware:_pe:*:*:*:*:*:*:* ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |