ID CVE-2017-7964
Type cve
Reporter NVD
Modified 2017-04-25T14:54:42
Description
Zyxel WRE6505 devices have a default TELNET password of 1234 for the root and admin accounts, which makes it easier for remote attackers to conduct DNS hijacking attacks by reconfiguring the built-in dnshijacker process.
{"edition": 2, "title": "CVE-2017-7964", "bulletinFamily": "NVD", "published": "2017-04-19T12:59:00", "lastseen": "2017-04-26T07:44:52", "history": [{"lastseen": "2017-04-20T09:52:08", "bulletin": {"edition": 1, "scanner": [], "bulletinFamily": "NVD", "published": "2017-04-19T12:59:00", "lastseen": "2017-04-20T09:52:08", "title": "CVE-2017-7964", "modified": "2017-04-19T12:59:00", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7964", "hash": "3d036af561194dc0c1aacc1c5624f8c7cf11f8c4eae64ba13ade58a6492931b7", "viewCount": 0, "reporter": "NVD", "cpe": [], "description": "Zyxel WRE6505 devices have a default TELNET password of 1234 for the root and admin accounts, which makes it easier for remote attackers to conduct DNS hijacking attacks by reconfiguring the built-in dnshijacker process.", "type": "cve", "hashmap": [{"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "title", "hash": "0566be278feb00bebf2688f255a0b133"}, {"key": "modified", "hash": "f479713bb8603c7d3b26f181e4293fc0"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "href", "hash": "8811a0271a46e9e33c1feb13d7b1de94"}, {"key": "published", "hash": "f479713bb8603c7d3b26f181e4293fc0"}, {"key": "description", "hash": "149fdade3e19a6df10284c24939a7439"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}, {"key": "cvss", "hash": "8cd4821cb504d25572038ed182587d85"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cvelist", "hash": "b1437c706e015d9d6a8f1092569655fd"}, {"key": "cpe", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "references", "hash": "3f389c61308bb13b1bf5622d743f6ec3"}], "references": ["https://www.oxy-gen.mobi/blog.html"], "objectVersion": "1.2", "history": [], "cvss": {"vector": "NONE", "score": 0.0}, "cvelist": ["CVE-2017-7964"], "id": "CVE-2017-7964", "assessment": {"system": "", "name": "", "href": ""}}, "differentElements": ["cvss", "modified", "cpe"], "edition": 1}], "modified": "2017-04-25T14:54:42", "reporter": "NVD", "hash": "0f737ccaf06dcd3b07193937612c410c696f9bda017d48662be0629005f76bcd", "viewCount": 0, "scanner": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-7964", "cpe": ["cpe:/o:zyxel:wre6505_firmware:v1.00%28aaqb.3%29c0"], "description": "Zyxel WRE6505 devices have a default TELNET password of 1234 for the root and admin accounts, which makes it easier for remote attackers to conduct DNS hijacking attacks by reconfiguring the built-in dnshijacker process.", "type": "cve", "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "15cc591ef0cb12959d7122d511c363bf"}, {"key": "cvelist", "hash": "b1437c706e015d9d6a8f1092569655fd"}, {"key": "cvss", "hash": "2bdabeb49c44761f9565717ab0e38165"}, {"key": "description", "hash": "149fdade3e19a6df10284c24939a7439"}, {"key": "href", "hash": "8811a0271a46e9e33c1feb13d7b1de94"}, {"key": "modified", "hash": "5f507e7afe279244d74e2d257ed692d4"}, {"key": "objectVersion", "hash": "56765472680401499c79732468ba4340"}, {"key": "published", "hash": "f479713bb8603c7d3b26f181e4293fc0"}, {"key": "references", "hash": "3f389c61308bb13b1bf5622d743f6ec3"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "0566be278feb00bebf2688f255a0b133"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "references": ["https://www.oxy-gen.mobi/blog.html"], "objectVersion": "1.2", "enchantments": {"score": {"vector": "NONE", "value": 7.5}, "dependencies": {"references": [], "modified": "2017-04-26T07:44:52"}, "vulnersScore": 7.5}, "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:COMPLETE/I:COMPLETE/A:COMPLETE/", "score": 10.0}, "cvelist": ["CVE-2017-7964"], "id": "CVE-2017-7964", "assessment": {"system": "", "name": "", "href": ""}}
{}