Lucene search

K
nessusThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.ZYXEL_HTTP_CONFIG_RESET.NASL
HistoryNov 22, 2004 - 12:00 a.m.

ZyXEL Prestige Router Configuration Reset

2004-11-2200:00:00
This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
www.tenable.com
26

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.038 Low

EPSS

Percentile

91.9%

The remote host is a ZyXEL router with a vulnerability in its web interface. With HTTP Remote Administration enabled, the page ‘/rpFWUpload.html’ does not require authentication. This allows an attacker to reset the router’s configuration to its factory state.

#
# (C) Tenable Network Security
#

include("compat.inc");

if(description)
{
   script_id(15781);
   script_cve_id("CVE-2004-1540");
   script_bugtraq_id(11723);
   script_xref(name:"Secunia", value:"13278");
   script_version ("1.20");
   
   script_name(english:"ZyXEL Prestige Router Configuration Reset");
   script_summary(english:"Tries to access an unrestricted admin webpage");

   script_set_attribute(   attribute:"synopsis",   value:
"The remote host is a router with a web vulnerability that allows
a remote attacker to reset its configuration to factory defaults."   );
   script_set_attribute(   attribute:"description",    value:
"The remote host is a ZyXEL router with a vulnerability in its web
interface.  With HTTP Remote Administration enabled, the page
'/rpFWUpload.html' does not require authentication. This allows an
attacker to reset the router's configuration to its factory state."   );
   script_set_attribute(
     attribute:"see_also",
     value:"https://seclists.org/bugtraq/2004/Nov/280"
   );
   script_set_attribute(
     attribute:"solution", 
     value:"Contact ZyXEL for a patch."
   );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/22");
 script_set_attribute(attribute:"vuln_publication_date", value: "2004/11/21");
 script_cvs_date("Date: 2018/11/15 20:50:24");
   script_set_attribute(attribute:"plugin_type", value:"remote");
   script_end_attributes();

   script_category(ACT_GATHER_INFO);
   script_copyright(english:"This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
   script_family(english:"Misc.");
   script_dependencie("http_version.nasl");
   script_require_ports(80);

   exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);

banner = get_http_banner(port:port);
if ( "ZyXEL-RomPager" >!< banner ) exit(0);

r = http_send_recv3(method:"GET", item:"/fpFWUpload.html", port:port);
if (isnull(r)) exit(0);
res = r[2];
if ( egrep(pattern:'<INPUT TYPE="BUTTON" NAME="ResetDefault" VALUE=".*" onClick="ConfirmDefault()"></div></td></tr><tr>', string:res ) )
	security_warning(port);

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.038 Low

EPSS

Percentile

91.9%

Related for ZYXEL_HTTP_CONFIG_RESET.NASL