GobyVuls/Gemtek_Modem_Configuration_Interface_Default_password_vulnerability.md

13 lines
1.3 KiB
Markdown
Raw Normal View History

## Gemtek Modem Configuration Interface Default password vulnerability
| **Vulnerability** | **Gemtek Modem Configuration Interface Default password vulnerability** |
| :----: | :-----|
| **Chinese name** | 中保無限Modem Configuration Interface 默认口令漏洞 |
| **CVSS core** | 5.0 |
| **FOFA Query** (click to view the results directly)| [(title="Modem configuration interface" && body="status_device_status.asp" && body!="Huawei") && header!="Couchdb" && header!="JoomlaWor"](https://en.fofa.info/result?qbase64=KHRpdGxlPSJNb2RlbSBjb25maWd1cmF0aW9uIGludGVyZmFjZSIgJiYgYm9keT0ic3RhdHVzX2RldmljZV9zdGF0dXMuYXNwIiAmJiBib2R5IT0iSHVhd2VpIikgJiYgaGVhZGVyIT0iQ291Y2hkYiIgJiYgaGVhZGVyIT0iSm9vbWxhV29yIg%3D%3D) |
| **Number of assets affected** | 4521 |
| **Description** | Modem Configuration Interface is an unlimited router management system of China Insurance Corporation. There is a default password in the system. An attacker can control the entire platform through the default password (sigmu/secom) and operate the core functions with administrator privileges. |
| **Impact** | attackers can control the entire platform through the default password(sigmu/secom) vulnerability, and use administrator privileges to operate core functions. |
![](https://s3.bmp.ovh/imgs/2023/05/26/fc6fd428ce123e79.gif)