Vulnerability Description
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Actiontec | Web6000Q Firmware | 1.1.02.22 |
| Actiontec | Web6000Q | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-EThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jun/1Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-EThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jun/1Mailing ListThird Party Advisory
FAQ
What is CVE-2018-15555?
CVE-2018-15555 is a vulnerability with a CVSS score of 9.8 (CRITICAL). On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
How severe is CVE-2018-15555?
CVE-2018-15555 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-15555?
Check the references section above for vendor advisories and patch information. Affected products include: Actiontec Web6000Q Firmware, Actiontec Web6000Q.