7.5
CVSSv3

CVE-2014-6435

Published: 12/01/2018 Updated: 31/01/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote malicious users to cause a denial of service (WAN connectivity reset) via a direct request.

Vulnerable Product Search on Vulmon Subscribe to Product

aztech adsl_dsl5018en_\\(1t1r\\)_firmware -

aztech dsl705e_firmware -

aztech dsl705eu_firmware -

Exploits

/* source: wwwsecurityfocuscom/bid/69809/info Multiple Aztech routers are prone to a denial-of-service vulnerability Attackers may exploit this issue to cause an affected device to crash, resulting in a denial-of-service condition Aztech DSL5018EN, DSL705E and DSL705EU are vulnerable */ #!/usr/bin/perl use strict; use IO::Socket; ...