Published: 29/11/2020 Updated: 03/12/2020
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

An issue exists on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. An low-privileged (non-admin) attacker can use a hardcoded password (4ef9cea10b2362f15ba4558b1d5c081f) to create an admin user.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vsolcn v1600d_firmware 2.03.57

vsolcn v1600d_firmware 2.03.69

vsolcn v1600d4l_firmware 1.01.49

vsolcn v1600d-mini_firmware 1.01.48

vsolcn v1600g1_firmware 1.9.7

vsolcn v1600g1_firmware 2.0.7

vsolcn v1600g2_firmware 1.1.4