An exposed Telnet Service on the Billion Smart Energy Router SG600R2 with firmware v3.02.rc6 allows a local network attacker to authenticate via hardcoded credentials into a shell, gaining root execution privileges over the device.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://github.com/InnotecSystem/Device-Reversing/wiki/Firmware-Inspection | third party advisory exploit |