CVE-2016-15056
Severity CVSS v4.0:
HIGH
Type:
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
Publication date:
14/11/2025
Last modified:
14/11/2025
Description
Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
References to Advisories, Solutions, and Tools
- https://seclists.org/fulldisclosure/2016/Jul/66
- https://web.archive.org/web/20160403014231/http://www.ubeeinteractive.com/products/cable/evw3226
- https://web.archive.org/web/20160726145043/http://www.search-lab.hu/advisories/122-ubee-evw3226-modem-router-multiple-vulnerabilities
- https://www.exploit-db.com/exploits/40156
- https://www.vulncheck.com/advisories/ubee-evw3226-unauthenticated-backup-file-disclosure



