Learn about CVE-2017-18371 affecting the ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router by TrueOnline. Discover the impact, technical details, and mitigation steps.
A vulnerability in the TrueOnline distributed router, specifically the ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 model, allows unauthorized access through default and hardcoded credentials.
Understanding CVE-2017-18371
This CVE identifies a security issue in the ZyXEL router distributed by TrueOnline due to default and hardcoded credentials.
What is CVE-2017-18371?
The TrueOnline distributed router, ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6, contains default and hardcoded credentials that can be exploited for unauthorized access and malicious activities.
The Impact of CVE-2017-18371
The hardcoded service accounts with default passwords can lead to unauthorized access to the router's web interface, enabling attackers to execute authenticated command injections and manipulate router configurations.
Technical Details of CVE-2017-18371
This section provides technical details about the vulnerability.
Vulnerability Description
The ZyXEL P660HN-T1A v2 TCLinux Fw #7.3.37.6 router distributed by TrueOnline has three user accounts with default passwords, including two hardcoded service accounts: one with the username 'true' and password 'true', and another with the username 'supervisor' and password 'zyad1234'. These accounts can be used for unauthorized access and malicious activities.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit the default and hardcoded credentials to gain unauthorized access to the router's web interface, execute authenticated command injections, and modify router settings for malicious purposes.
Mitigation and Prevention
Protecting against this vulnerability requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Refer to the vendor's security advisories and updates to apply patches that address the hardcoded credentials issue.