Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN700…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, are potentially vulnerable to improper input validation. The device's advanced status web page that is linked to from the basic status web page does not appear to properly parse malformed GET requests. This may lead to a denial of service.
0
Attacker Value
Unknown

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN700…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, uses hard coded credentials. Access to the device's default telnet port (23) can be obtained through using one of a few default credentials shared among all devices.
0
Attacker Value
Unknown

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN700…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, lacks authentication. An unauthenticated user may send an HTTP GET request to http://[ip]/com/gatewayreset or http://[ip]/cgi/reboot.bin to cause the modem to reboot.
0
Attacker Value
Unknown

Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN700…

Disclosure Date: July 13, 2018 (last updated November 27, 2024)
Hughes high-performance broadband satellite modems, models HN7740S DW7000 HN7000S/SM, is vulnerable to an authentication bypass using an alternate path or channel. By default, port 1953 is accessible via telnet and does not require authentication. An unauthenticated remote user can access many administrative commands via this interface, including rebooting the modem.
0