Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2009-2271
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Huawei D100 has (1) a certain default administrator password for the web interface, and does not force a password change; and has (2) a default password of admin for the admin account in the telnet interface; which makes it easier for remote attackers to obtain access.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
华为D100路由器多个安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
D100是世界上第一个通过WiFi链接将手机、游戏机、PC和手提电脑连接在一起的WiFi适配器。 D100固件及其默认配置中存在多个安全漏洞,可能允许LAN用户非授权访问设备。 #1 系统没有强制管理员在初次登录的时候更改默认口令,很多管理员仍在使用默认口令。 #2 默认启用了Telnet服务,LAN中用户可以使用默认的admin:admin账号以root用户权限登录。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2009-2271
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2009-2271
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2009-2271

No comments yet


Leave a comment