Globe has offered their Broadband internet connection to their subscribers with the model of their modem 'ZTE ZXHN H108N V2.5' and with the firmware version V.2.5.9XXX. ![]() ZTE ZXHN H108N R1A devices before _PE and ZXV10 W300 devices W300V1.0.0f_ER1_PE allow remote authenticated users to bypass intended access restrictions, and discover credentials and keys, by reading the configuration file, a different vulnerability than CVE-2015-7248. Default Admin Password and Username for Globe ZTE ZXHN H108N. ZTE ZXHN H108N R1A devices before _PE have a hardcoded password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session.Ĭross-site scripting (XSS) vulnerability in cgi-bin/webproc on ZTE ZXHN H108N R1A devices before _PE allows remote attackers to inject arbitrary web script or HTML via the errorpage parameter.Ĥ Zxhn H108n R1a, Zxhn H108n R1a Firmware, Zxv10 W300 and 1 more ZTE ZXHN H108N R1A devices before _PE allow remote authenticated users to bypass intended access restrictions via a modified request, as demonstrated by leveraging the support account to change a password via a cgi-bin/webproc accountpsd action.Ībsolute path traversal vulnerability in cgi-bin/webproc on ZTE ZXHN H108N R1A devices before _PE allows remote attackers to read arbitrary files via a full pathname in the getpage parameter. ZTE ZXHN H108N R1A devices before _PE allow remote attackers to discover usernames and password hashes by reading the cgi-bin/webproc HTML source code, a different vulnerability than CVE-2015-8703. ![]() 2 Zxhn H108n R1a, Zxhn H108n R1a Firmware
0 Comments
Leave a Reply. |