vendor:
N300/N600
by:
Roberto Paleari, Alessandro Di Pinto
8,5
CVSS
HIGH
Authentication Bypass
287
CWE
Product Name: N300/N600
Affected Version From: 1.07
Affected Version To: 1.15
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Wi-Fi
2013
Multiple vulnerabilities on Sitecom N300/N600 devices
The firmware running on the affected devices is prone to multiple security issues that allow attackers to bypass existing authentication mechanisms and gain administrative access to the device, with root privileges. In detail, affected firmware versions generate the default WPA2 key and access credentials starting from publicly-accessible information, such as the MAC address for the Wi-Fi interface. In addition, there is an undocumented URL that enables the Telnet service on the WAN site; attackers can then login using an hard-coded (and unchangeable) username/password combination.
Mitigation:
The vendor has released a new firmware version (1.17) that fixes the vulnerabilities. Users are encouraged to upgrade their devices as soon as possible.