Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
ZyXEL Prestige Router Access Validation Vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Prestige Router
by:
Unknown
5
CVSS
MEDIUM
Access Validation
284
CWE
Product Name: Prestige Router
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

ZyXEL Prestige Router Access Validation Vulnerability

The ZyXEL Prestige router series is prone to an access validation vulnerability. The vulnerability allows remote attackers to reset the router's configuration by accessing a specific configuration page of the ZyXEL Prestige HTTP-based remote administration service.

Mitigation:

To mitigate this vulnerability, it is recommended to update the firmware of the affected ZyXEL Prestige router to the latest version. Additionally, restricting access to the administration service from untrusted networks can also help prevent exploitation.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11723/info

ZyXEL Prestige router series is reported prone to an access validation vulnerability. The vulnerability exists because the firmware of the router fails to restrict access to a configuration page that is a part of the ZyXEL Prestige HTTP based remote administration service.

A remote attacker may exploit this vulnerability to reset the configuration of the router.

http://www.example.com/rpFWUpload.html