vendor:
AT-RG634A ADSL Broadband router
by:
N/A
7,5
CVSS
HIGH
CWE-78 : OS Command Injection, CWE-306 : Missing Authentication for Critical Function
78, 306
CWE
Product Name: AT-RG634A ADSL Broadband router
Affected Version From: 3.3+
Affected Version To: 3.8.05
Patch Exists: YES
Related CWE: CVE-2014-1982
CPE: N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Allied Telesis iMG624A, Allied Telesis iMG616LH, Allied Telesis iMG646BD
2014
Allied Telesis AT-RG634A ADSL Broadband router hidden administrative unauthenticated webshell.
The Allied Telesis AT-RG634A ADSL Broadband router has a hidden URL (/cli.html) page to execute CLI command with admin priviledges, available by default and without any kind of authentication. Having as impact a total comproise of the device, an attacker can execute arbitrary commands as admin, and even gain access to the configuration file of the device.
Mitigation:
Configure the device so that only trusted devices can access the target device using the command 'WEBSERVER SET MANAGEMENTIP <ip-address>'