CVE-2014-0329
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
04/02/2014
Last modified:
11/04/2025
Description
The TELNET service on the ZTE ZXV10 W300 router 2.1.0 has a hardcoded password ending with airocon for the admin account, which allows remote attackers to obtain administrative access by leveraging knowledge of the MAC address characters present at the beginning of the password.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:h:zte:zxv10_w300:2.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html
- http://osvdb.org/102816
- http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html
- http://www.kb.cert.org/vuls/id/228886
- http://www.securityfocus.com/bid/65310
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90958
- http://blog.alguien.at/2014/02/hackeando-el-router-zte-zxv10-w300-v21.html
- http://osvdb.org/102816
- http://packetstormsecurity.com/files/125142/ZTE-ZXV10-W300-Hardcoded-Credentials.html
- http://www.kb.cert.org/vuls/id/228886
- http://www.securityfocus.com/bid/65310
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90958