Vulnerability Description
The Axesstel AXW-D800 modem with D2_ETH_109_01_VEBR Jun-14-2006 software does not require authentication for (1) etc/config/System.html, (2) etc/config/Network.html, (3) etc/config/Security.html, (4) cgi-bin/sysconf.cgi, and (5) cgi-bin/route.cgi, which allows remote attackers to change the modem's configuration via direct requests.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Axesstel | Akw-D800 | d2_eth_109_01_vebr |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/31285
- http://securityreason.com/securityalert/4089
- http://www.securityfocus.com/archive/1/494815/100/0/threaded
- http://www.securityfocus.com/bid/30404
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44044
- http://secunia.com/advisories/31285
- http://securityreason.com/securityalert/4089
- http://www.securityfocus.com/archive/1/494815/100/0/threaded
- http://www.securityfocus.com/bid/30404
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44044
FAQ
What is CVE-2008-3411?
CVE-2008-3411 is a vulnerability with a CVSS score of 10.0 (HIGH). The Axesstel AXW-D800 modem with D2_ETH_109_01_VEBR Jun-14-2006 software does not require authentication for (1) etc/config/System.html, (2) etc/config/Network.html, (3) etc/config/Security.html, (4) ...
How severe is CVE-2008-3411?
CVE-2008-3411 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-3411?
Check the references section above for vendor advisories and patch information. Affected products include: Axesstel Akw-D800.