9.8
CVSSv3

CVE-2014-6436

Published: 12/01/2018 Updated: 09/10/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote malicious users to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.

Vulnerable Product Search on Vulmon Subscribe to Product

aztech adsl_dsl5018en_\\(1t1r\\)_firmware -

aztech dsl705e_firmware -

aztech dsl705eu_firmware -

Exploits

source: wwwsecurityfocuscom/bid/69811/info Multiple Aztech Modem Routers are prone to a session-hijacking vulnerability An attacker can exploit this issue to gain unauthorized access to the affected device #!/usr/bin/perl # Title: Aztech Modem Broken Session Management Exploit # Author: Eric Fajardo - fjpfajardo@phibmcom # # A suc ...