mirror of
https://github.com/gobysec/GobyVuls.git
synced 2025-05-06 10:41:40 +00:00
13 lines
1.3 KiB
Markdown
13 lines
1.3 KiB
Markdown
![]() |
## Gemtek Modem Configuration Interface Default password vulnerability
|
||
|
|
||
|
| **Vulnerability** | **Gemtek Modem Configuration Interface Default password vulnerability** |
|
||
|
| :----: | :-----|
|
||
|
| **Chinese name** | 中保無限Modem Configuration Interface 默认口令漏洞 |
|
||
|
| **CVSS core** | 5.0 |
|
||
|
| **FOFA Query** (click to view the results directly)| [(title="Modem configuration interface" && body="status_device_status.asp" && body!="Huawei") && header!="Couchdb" && header!="JoomlaWor"](https://en.fofa.info/result?qbase64=KHRpdGxlPSJNb2RlbSBjb25maWd1cmF0aW9uIGludGVyZmFjZSIgJiYgYm9keT0ic3RhdHVzX2RldmljZV9zdGF0dXMuYXNwIiAmJiBib2R5IT0iSHVhd2VpIikgJiYgaGVhZGVyIT0iQ291Y2hkYiIgJiYgaGVhZGVyIT0iSm9vbWxhV29yIg%3D%3D) |
|
||
|
| **Number of assets affected** | 4521 |
|
||
|
| **Description** | Modem Configuration Interface is an unlimited router management system of China Insurance Corporation. There is a default password in the system. An attacker can control the entire platform through the default password (sigmu/secom) and operate the core functions with administrator privileges. |
|
||
|
| **Impact** | attackers can control the entire platform through the default password(sigmu/secom) vulnerability, and use administrator privileges to operate core functions. |
|
||
|
|
||
|

|