The AT&T U-verse 9.2.2h0d83 firmware for the Arris NVG589 and NVG599 devices, when IP Passthrough mode is not used, configures ssh-permanent-enable WAN SSH logins to the remotessh account with the 5SaP9I26 password, which allows remote attackers to access a "Terminal shell v1.0" service, and subsequently obtain unrestricted root privileges, by establishing an SSH session and then entering certain shell metacharacters and BusyBox commands.
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14115
원문출처 : https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-14115
댓글 0
번호 | 제목 | 글쓴이 | 날짜 | 조회 수 |
---|---|---|---|---|
347 | CVE-2017-0031 | 관리자 | 2017.03.18 | 6 |
346 | CVE-2017-0015 | 관리자 | 2017.03.18 | 6 |
345 | CVE-2017-6547 | 관리자 | 2017.03.10 | 6 |
344 | CVE-2016-3221 | 관리자 | 2016.06.17 | 6 |
343 | CVE-2016-3212 | 관리자 | 2016.06.17 | 6 |
342 | CVE-2016-0199 | 관리자 | 2016.06.17 | 6 |
341 | CVE-2016-0028 | 관리자 | 2016.06.17 | 6 |
340 | CVE-2018-5955 | 관리자 | 2018.01.25 | 5 |
339 | CVE-2017-18045 | 관리자 | 2018.01.25 | 5 |
338 | CVE-2017-15713 | 관리자 | 2018.01.25 | 5 |
337 | CVE-2017-18044 | 관리자 | 2018.01.25 | 5 |
336 | CVE-2014-4919 | 관리자 | 2018.01.25 | 5 |
335 | CVE-2015-6926 | 관리자 | 2018.01.25 | 5 |
334 | CVE-2008-7319 | 관리자 | 2017.11.09 | 5 |
333 | CVE-2017-2864 | 관리자 | 2017.11.09 | 5 |