Vulnerability Description
ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zyxel | Pk5001Z Firmware | - |
| Zyxel | Pk5001Z | - |
Related Weaknesses (CWE)
References
- https://forum.openwrt.org/viewtopic.php?id=62266ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/43105/
- https://forum.openwrt.org/viewtopic.php?id=62266ExploitThird Party Advisory
- https://www.exploit-db.com/exploits/43105/
FAQ
What is CVE-2016-10401?
CVE-2016-10401 is a vulnerability with a CVSS score of 8.8 (HIGH). ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists w...
How severe is CVE-2016-10401?
CVE-2016-10401 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-10401?
Check the references section above for vendor advisories and patch information. Affected products include: Zyxel Pk5001Z Firmware, Zyxel Pk5001Z.