Description
ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote authenticated users to bypass intended access restrictions via a modified request, as demonstrated by leveraging the support account to change a password via a cgi-bin/webproc accountpsd action.
Exploits (1)
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/77421
Third Party Advisory, US Government Resource x_refsource_confirm
https://www.kb.cert.org/vuls/id/BLUU-9ZDJWA
Third Party Advisory, US Government Resource third-party-advisory
x_refsource_cert-vn
https://www.kb.cert.org/vuls/id/391604
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/38773/
Scores
CVSS v3
4.9
EPSS
0.1122
EPSS Percentile
93.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Details
CWE
CWE-264
Status
published
Products (1)
zte/zxhn_h108n_r1a_firmware
< zte.bhs.zxhnh108nr1a.h_pe
Published
Dec 30, 2015
Tracked Since
Feb 18, 2026