Vulnerability Description
The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnerability to login and execute commands on the device, as well as upgrade the firmware image to a malicious version.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Imomobile | Verve Connect Vh510 Firmware | < 1.0.1.6l0516 |
| Imomobile | Verve Connect Vh510 | l0am095a |
Related Weaknesses (CWE)
References
- https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/Third Party Advisory
- https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-DiscloExploitThird Party Advisory
- https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/Third Party Advisory
- https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-DiscloExploitThird Party Advisory
FAQ
What is CVE-2020-27689?
CVE-2020-27689 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnera...
How severe is CVE-2020-27689?
CVE-2020-27689 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-27689?
Check the references section above for vendor advisories and patch information. Affected products include: Imomobile Verve Connect Vh510 Firmware, Imomobile Verve Connect Vh510.