vendor:
Sagem F@st 3304-V2
by:
Yassine Aboukir
7.5
CVSS
HIGH
Authentication Bypass
CWE
Product Name: Sagem F@st 3304-V2
Affected Version From:
Affected Version To:
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Firefox, Google Chrome, Internet Explorer
2014
Sagem F@st 3304-V2 Authentication Bypass
The Sagem Fast 3304-V2 router is vulnerable to an authentication bypass bug which allows unprivileged users to modify the preconfigured root password then log in with administrator permissions. The vulnerability can be exploited by running javascript code in the web browser bar. The default URL to access the web management interface is http://192.168.1.1 but this attack can also be performed by an external attacker who connects to the router's public IP address.
Mitigation:
The vendor should release a patch to fix the authentication bypass vulnerability. In the meantime, users can mitigate the risk by changing the default root password and regularly updating the router's firmware.