Support Us — Your donation helps us keep running

Goal: 1000 CNY,Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2016-15056
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Ubee EVW3226 Unauthenticated Backup File Disclosure
Source: NVD (National Vulnerability Database)
Vulnerability Description
Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
文件和路径信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ubee EVW3226 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ubee EVW3226是中国台湾Ubee公司的一个WiFi路由器。 Ubee EVW3226 1.0.20及之前版本存在安全漏洞,该漏洞源于配置备份文件存储在web根目录且未加密,可能导致敏感信息泄露和设备完全破解。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
Ubee InteractiveUbee EVW3226 0 ~ 1.0.20 -
II. Public POCs for CVE-2016-15056
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2016-15056
Please Login to view more intelligence information
New Vulnerabilities
V. Comments for CVE-2016-15056

No comments yet


Leave a comment