A vulnerability, which was classified as critical, has been found in LB-LINK BL-AC3600 1.0.22. Affected by this issue is some unknown functionality of the file /etc/shadow. The manipulation with the input root:blinkadmin leads to hard-coded credentials. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communication to external components.
The product contains hard-coded credentials, such as a password or cryptographic key.
Link | Tags |
---|---|
https://vuldb.com/?id.316262 | vdb entry technical description third party advisory |
https://vuldb.com/?ctiid.316262 | vdb entry signature permissions required |
https://vuldb.com/?submit.605630 | vdb entry third party advisory |
https://github.com/waiwai24/0101/blob/main/CVEs/Blink/Hardcoded_Credentials_in_BL-AC3600_Routers.md | exploit related third party advisory |
https://github.com/waiwai24/0101/blob/main/CVEs/Blink/Hardcoded_Credentials_in_BL-AC3600_Routers.md#poc | exploit third party advisory |