The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14115
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14115
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
167 | CVE-2017-6578 (mail-masta) | 관리자 | 2017.03.10 | 9 |
166 | CVE-2017-12857 | 관리자 | 2017.08.27 | 9 |
165 | CVE-2017-7693 | 관리자 | 2017.08.27 | 9 |
164 | CVE-2017-14114 | 관리자 | 2017.09.04 | 9 |
163 | CVE-2017-14098 | 관리자 | 2017.09.04 | 9 |
162 | CVE-2017-10793 | 관리자 | 2017.09.04 | 9 |
161 | CVE-2017-14117 | 관리자 | 2017.09.04 | 9 |
160 | CVE-2017-14121 | 관리자 | 2017.09.04 | 9 |
159 | CVE-2017-14120 | 관리자 | 2017.09.04 | 9 |
158 | CVE-2017-2884 | 관리자 | 2017.11.09 | 9 |
157 | CVE-2017-16648 | 관리자 | 2017.11.09 | 9 |
156 | CVE-2017-16646 | 관리자 | 2017.11.09 | 9 |
155 | CVE-2018-1362 | 관리자 | 2018.01.25 | 9 |
154 | CVE-2017-14094 | 관리자 | 2018.01.25 | 9 |
153 | CVE-2017-12112 | 관리자 | 2018.01.25 | 9 |