Learn about CVE-2021-27172, a vulnerability in FiberHome HG6245D devices allowing unauthorized access through a hardcoded GEPON password. Discover impact, technical details, and mitigation steps.
An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.
Understanding CVE-2021-27172
This CVE identifies a security issue on FiberHome HG6245D devices that allows unauthorized access through a hardcoded GEPON password for the root account.
What is CVE-2021-27172?
CVE-2021-27172 exposes a vulnerability in FiberHome HG6245D devices running RP2613, where a hardcoded GEPON password for the root account is present in the /etc/init.d/system-config.sh file.
The Impact of CVE-2021-27172
The presence of a hardcoded password in the device's configuration file poses a significant security risk by allowing attackers to gain unauthorized access to the affected devices.
Technical Details of CVE-2021-27172
The technical details of CVE-2021-27172 include:
Vulnerability Description
The vulnerability involves the presence of a hardcoded GEPON password for the root account in FiberHome HG6245D devices with RP2613.
Affected Systems and Versions
The issue affects FiberHome HG6245D devices operating on firmware version RP2613.
Exploitation Mechanism
Attackers can exploit the vulnerability by using the hardcoded GEPON password to gain unauthorized access to the root account on the affected devices.
Mitigation and Prevention
To address CVE-2021-27172, follow these steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Check with the device vendor for firmware updates that address the hardcoded password issue and apply them as soon as possible.