Vulnerability Description
IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Datacast | Sfx2100 Firmware | - |
| Datacast | Sfx2100 | - |
Related Weaknesses (CWE)
References
- https://www.abdulmhsblog.com/posts/sfx2100-vulns/ExploitThird Party Advisory
- https://www.abdulmhsblog.com/posts/sfx2100-vulns/ExploitThird Party Advisory
FAQ
What is CVE-2026-29128?
CVE-2026-29128 is a vulnerability with a CVSS score of 10.0 (CRITICAL). IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The config...
How severe is CVE-2026-29128?
CVE-2026-29128 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-29128?
Check the references section above for vendor advisories and patch information. Affected products include: Datacast Sfx2100 Firmware, Datacast Sfx2100.