Vulnerability Description
cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aztech | Adsl Dsl5018En \(1T1R\) Firmware | - |
| Aztech | Adsl Dsl5018En \(1T1R\) | - |
| Aztech | Dsl705E Firmware | - |
| Aztech | Dsl705E | - |
| Aztech | Dsl705Eu Firmware | - |
| Aztech | Dsl705Eu | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/69809Third Party AdvisoryVDB Entry
- http://packetstormsecurity.com/files/128254/Aztech-DSL5018EN-DSL705E-DSL705EU-DoExploitThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/bid/69809Third Party AdvisoryVDB Entry
FAQ
What is CVE-2014-6435?
CVE-2014-6435 is a vulnerability with a CVSS score of 7.5 (HIGH). cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity re...
How severe is CVE-2014-6435?
CVE-2014-6435 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-6435?
Check the references section above for vendor advisories and patch information. Affected products include: Aztech Adsl Dsl5018En \(1T1R\) Firmware, Aztech Adsl Dsl5018En \(1T1R\), Aztech Dsl705E Firmware, Aztech Dsl705E, Aztech Dsl705Eu Firmware.