vendor:
MT711x
by:
Alireza Azimzadeh Milani (alimp5)
8,8
CVSS
HIGH
Authentication Bypass, Information Disclosure, Password Change, Denial of Service
287, 200, 522, 399
CWE
Product Name: MT711x
Affected Version From: V_3_11_14_9_CPE
Affected Version To: V_3_11_14_9_CPE
Patch Exists: YES
Related CWE: N/A
CPE: h:seowonintech:mt711x
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Kali-Linux
2015
WIMAX MT711x – Multiple Vulnerabilities
I'm an ethical penetration tester and super moderator of Iran Security Team. I have updated the modem to latest firmware which released by the company. but with this work(upgrading the firmware); The attacker can bypass the authentication mechanism. I used BurpSuite, wget and Nmap to find the vulnerabilities. The attacker can get the WIFI settings, Wimax credentials, enable and disable connections to modem, launch (D)DOS attack and change the password of ADMIN account.
Mitigation:
Update the modem to the latest firmware, use strong passwords, use two-factor authentication, use firewalls and intrusion detection systems.