diff --git a/Gemtek_Modem_Configuration_Interface_Default_password_vulnerability.md b/Gemtek_Modem_Configuration_Interface_Default_password_vulnerability.md new file mode 100644 index 0000000..8ddfbb8 --- /dev/null +++ b/Gemtek_Modem_Configuration_Interface_Default_password_vulnerability.md @@ -0,0 +1,12 @@ +## Gemtek Modem Configuration Interface Default password vulnerability + +| **Vulnerability** | **Gemtek Modem Configuration Interface Default password vulnerability** | +| :----: | :-----| +| **Chinese name** | 中保無限Modem Configuration Interface 默认口令漏洞 | +| **CVSS core** | 5.0 | +| **FOFA Query** (click to view the results directly)| [(title="Modem configuration interface" && body="status_device_status.asp" && body!="Huawei") && header!="Couchdb" && header!="JoomlaWor"](https://en.fofa.info/result?qbase64=KHRpdGxlPSJNb2RlbSBjb25maWd1cmF0aW9uIGludGVyZmFjZSIgJiYgYm9keT0ic3RhdHVzX2RldmljZV9zdGF0dXMuYXNwIiAmJiBib2R5IT0iSHVhd2VpIikgJiYgaGVhZGVyIT0iQ291Y2hkYiIgJiYgaGVhZGVyIT0iSm9vbWxhV29yIg%3D%3D) | +| **Number of assets affected** | 4521 | +| **Description** | Modem Configuration Interface is an unlimited router management system of China Insurance Corporation. There is a default password in the system. An attacker can control the entire platform through the default password (sigmu/secom) and operate the core functions with administrator privileges. | +| **Impact** | attackers can control the entire platform through the default password(sigmu/secom) vulnerability, and use administrator privileges to operate core functions. | + +![](https://s3.bmp.ovh/imgs/2023/05/26/fc6fd428ce123e79.gif)