9.8
CVSSv3

CVE-2017-16885

Published: 12/01/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 506
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Improper Permissions Handling in the Portal on FiberHome LM53Q1 VH519R05C01S38 devices (intended for obtaining information about Internet Usage, Changing Passwords, etc.) allows remote malicious users to look for the information without authenticating. The information includes Version of device, Firmware ID, Connected users to device along their MAC Addresses, etc.

Vulnerable Product Search on Vulmon Subscribe to Product

fiberhome lm53q1_firmware vh519r05c01s38

Exploits

#!/usr/bin/python # /$$$$$$$$ /$$ /$$ /$$ /$$ /$$$$$$$ /$$ /$$$$$$$$ /$$ /$$ /$$ # | $$_____/|__/| $$ | $$ | $$ | $$__ $$ ...
FiberHome MIFI LM53Q1 suffers from credential disclosure and password change vulnerabilities ...

Github Repositories

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay informed about the latest trends.

CVE Prioritizer Tool CVE_Prioritizer is a powerful tool that helps you prioritize vulnerability patching by combining CVSS, EPSS, and CISA's Known Exploited Vulnerabilities It provides valuable insights into the likelihood of exploitation and the potential impact of vulnerabilities on your information system Why Combine CVSS, EPSS, and CISA's KEV? CVE_Prioritizer le

Risklogyx represents a robust solution that aids in the prioritization of vulnerability patching. It achieves this by amalgamating CVSS, EPSS, and CISA's Known Exploited Vulnerabilities data. This tool delivers invaluable insights into the probability of exploitation and the potential repercussions of vulnerabilities on your information system.

Risklogyx Risklogyx represents a robust solution that aids in the prioritization of vulnerability patching It achieves this by amalgamating CVSS, EPSS, and CISA's Known Exploited Vulnerabilities data This tool delivers invaluable insights into the probability of exploitation and the potential repercussions of vulnerabilities on your information system Installation Clo