Vulnerability Description
An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 with telnet/netcat.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Actiontec | Web6000Q Firmware | 1.1.02.22 |
| Actiontec | Web6000Q | - |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-EExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jun/2Mailing ListThird Party Advisory
- http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-EExploitThird Party AdvisoryVDB Entry
- http://seclists.org/fulldisclosure/2019/Jun/2Mailing ListThird Party Advisory
FAQ
What is CVE-2018-15557?
CVE-2018-15557 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain ...
How severe is CVE-2018-15557?
CVE-2018-15557 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-15557?
Check the references section above for vendor advisories and patch information. Affected products include: Actiontec Web6000Q Firmware, Actiontec Web6000Q.