vendor:
3G21WB
by:
Roberto Paleari
N/A
CVSS
N/A
Authentication bypass, command-injection
78, 77
CWE
Product Name: 3G21WB
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE: None
CPE: None
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2012
Hard-coded credentials and command-injection vulnerabilities on BigPond 3G21WB
A user can authenticate to the web server running on the device using the credentials 'Monitor:bigpond1'. These credentials are hard-coded, and cannot be changed by a normal user. The 'ping.cgi' web page is subject to a command-injection vulnerability, as the server-side script does not properly validate user-supplied input. The following URL exploits this issue, executing the 'ls /' command: http://<device IP address>/ping.cgi?DIA_IPADDRESS=;%20cat%20/etc/passwd
Mitigation:
We suggest users to disable web access on the WAN side.