CVE-2014-6436
Summary
| CVE | CVE-2014-6436 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-01-12 17:29:00 UTC |
| Updated | 2018-10-09 19:51:00 UTC |
| Description | Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Aztech | Adsl Dsl5018en 1t1r | - | All | All | All |
| Operating System | Aztech | Adsl Dsl5018en 1t1r Firmware | - | All | All | All |
| Hardware | Aztech | Adsl Dsl5018en 1t1r | - | All | All | All |
| Hardware | Aztech | Adsl Dsl5018en 1t1r | - | All | All | All |
| Operating System | Aztech | Adsl Dsl5018en 1t1r Firmware | - | All | All | All |
| Operating System | Aztech | Adsl Dsl5018en 1t1r Firmware | - | All | All | All |
| Hardware | Aztech | Dsl705e | - | All | All | All |
| Hardware | Aztech | Dsl705e | - | All | All | All |
| Hardware | Aztech | Dsl705eu | - | All | All | All |
| Hardware | Aztech | Dsl705eu | - | All | All | All |
| Operating System | Aztech | Dsl705eu Firmware | - | All | All | All |
| Operating System | Aztech | Dsl705eu Firmware | - | All | All | All |
| Operating System | Aztech | Dsl705e Firmware | - | All | All | All |
| Operating System | Aztech | Dsl705e Firmware | - | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Multiple Aztech Modem Routers Session Hijacking Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Aztech DSL5018EN / DSL705E / DSL705EU DoS / Broken Session Management ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.