vendor:
CT-5624 ADSL2+ Ethernet Router
by:
Todor Donev
7.5
CVSS
HIGH
Remote
N/A
CWE
Product Name: CT-5624 ADSL2+ Ethernet Router
Affected Version From: A011-306TSR-C01_R03
Affected Version To: A111-312BTC-C01_R12
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2009
Comtrend Router CT-5624 Remote Root/Support Password Disclosure/Change Exploit
This exploit allows an attacker to remotely disclose or change the root/support password of Comtrend Router CT-5624. The exploit is written in Perl and uses the LWP::Simple module to send a GET request to the router's password.cgi page. The exploit has been tested on two different versions of the router, CT-5624 and CT-5637.
Mitigation:
The user should update the router's firmware to the latest version and ensure that the router is not exposed to the public internet.