## Gemtek Modem Configuration Interface Default password vulnerability | **Vulnerability** | **Gemtek Modem Configuration Interface Default password vulnerability** | | :----: | :-----| | **Chinese name** | 中保無限Modem Configuration Interface 默认口令漏洞 | | **CVSS core** | 5.0 | | **FOFA Query** (click to view the results directly)| [(title="Modem configuration interface" && body="status_device_status.asp" && body!="Huawei") && header!="Couchdb" && header!="JoomlaWor"](https://en.fofa.info/result?qbase64=KHRpdGxlPSJNb2RlbSBjb25maWd1cmF0aW9uIGludGVyZmFjZSIgJiYgYm9keT0ic3RhdHVzX2RldmljZV9zdGF0dXMuYXNwIiAmJiBib2R5IT0iSHVhd2VpIikgJiYgaGVhZGVyIT0iQ291Y2hkYiIgJiYgaGVhZGVyIT0iSm9vbWxhV29yIg%3D%3D) | | **Number of assets affected** | 4521 | | **Description** | Modem Configuration Interface is an unlimited router management system of China Insurance Corporation. There is a default password in the system. An attacker can control the entire platform through the default password (sigmu/secom) and operate the core functions with administrator privileges. | | **Impact** | attackers can control the entire platform through the default password(sigmu/secom) vulnerability, and use administrator privileges to operate core functions. | ![](https://s3.bmp.ovh/imgs/2023/05/26/fc6fd428ce123e79.gif)