cvelist/2014/0xxx/CVE-2014-0329.json

87 lines
2.9 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 01:42:33 +00:00
"CVE_data_meta": {
"ASSIGNER": "cert@cert.org",
"ID": "CVE-2014-0329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-18 01:42:33 +00:00
"lang": "eng",
"value": "The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password."
2017-10-16 12:31:07 -04:00
}
2019-03-18 01:42:33 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#228886",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/228886"
},
{
"name": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html"
},
{
"name": "zxv10-w300-cve20140329-sec-bypass(90958)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/90958"
},
{
"name": "102816",
"refsource": "OSVDB",
"url": "http://osvdb.org/102816"
},
{
"name": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html",
"refsource": "MISC",
"url": "http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html"
},
{
"name": "65310",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/65310"
}
]
}
}