CVE-2021-27172

An issue was discovered on FiberHome HG6245D devices through RP2613. A hardcoded GEPON password for root is defined inside /etc/init.d/system-config.sh.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*

History

12 Feb 2021, 01:00

Type Values Removed Values Added
CPE cpe:2.3:o:fiberhome:hg6245d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:fiberhome:hg6245d:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 9.8
CWE CWE-798
References (MISC) https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#telnet-linux-hardcoded-credentials - (MISC) https://pierrekim.github.io/blog/2021-01-12-fiberhome-ont-0day-vulnerabilities.html#telnet-linux-hardcoded-credentials - Exploit, Third Party Advisory

10 Feb 2021, 19:57

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-10 19:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-27172

Mitre link : CVE-2021-27172

CVE.ORG link : CVE-2021-27172


JSON object : View

Products Affected

fiberhome

  • hg6245d_firmware
  • hg6245d
CWE
CWE-798

Use of Hard-coded Credentials