CVE-2014-6435
Summary
| CVE | CVE-2014-6435 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-01-12 17:29:00 UTC |
| Updated | 2018-01-31 15:24:00 UTC |
| Description | cgi-bin/AZ_Retrain.cgi in Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices does not check for authentication, which allows remote attackers to cause a denial of service (WAN connectivity reset) via a direct request. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Aztech | Adsl Dsl5018en 1t1r | - | All | All | All |
| Operating System | Aztech | Adsl Dsl5018en 1t1r Firmware | - | All | All | All |
| Hardware | Aztech | Adsl Dsl5018en 1t1r | - | All | All | All |
| Hardware | Aztech | Adsl Dsl5018en 1t1r | - | All | All | All |
| Operating System | Aztech | Adsl Dsl5018en 1t1r Firmware | - | All | All | All |
| Operating System | Aztech | Adsl Dsl5018en 1t1r Firmware | - | All | All | All |
| Hardware | Aztech | Dsl705e | - | All | All | All |
| Hardware | Aztech | Dsl705e | - | All | All | All |
| Hardware | Aztech | Dsl705eu | - | All | All | All |
| Hardware | Aztech | Dsl705eu | - | All | All | All |
| Operating System | Aztech | Dsl705eu Firmware | - | All | All | All |
| Operating System | Aztech | Dsl705eu Firmware | - | All | All | All |
| Operating System | Aztech | Dsl705e Firmware | - | All | All | All |
| Operating System | Aztech | Dsl705e Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Multiple Aztech Routers '/cgi-bin/AZ_Retrain.cgi' Denial of Service Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Aztech DSL5018EN / DSL705E / DSL705EU DoS / Broken Session Management ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.