Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2007-0435
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
T-Com Speedport 500V routers with firmware 1.31 allow remote attackers to bypass authentication and reconfigure the device via a LOGINKEY=TECOM cookie value.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
T-Com Speedport绕过登录认证漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Speedport 500V是德国ADSL供应商广泛销售的宽带路由器。 Speedport 500V在处理访问认证的机制上存在漏洞,远程攻击者可能利用此漏洞非授权控制设备。Speedport在验证用户输入口令时仅仅将cookie设置为LOGINKEY=TECOM内容(硬编码,无法更改)。如果攻击者能够创建这个cookie的话,就可以通过直接调用配置HTML站点绕过口令认证,获得非授权访问,更改系统配置,如禁用防火墙。虽然攻击者在不知道旧口令的情况下旧无法更改系统口令,但可以通过固件升级将口令重置为默认,这
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2007-0435
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2007-0435
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2007-0435

No comments yet


Leave a comment