Fiberhome hg6245d telnet password 2021. References https://nvd.


Fiberhome hg6245d telnet password 2021 May 24, 2022 · It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server. Jan 13, 2021 · The FiberHome HG6245D routers are GPON FTTH routers. The Impact of CVE-2021-27165. It allows unauthorized access to the telnet daemon on port 23/tcp using the gpon/gpon default credentials. Feb 10, 2021 · An issue was discovered on FiberHome HG6245D devices through RP2613. The password for the enable command is gpon. Jan 12, 2021 · It is also possible to enable a CLI telnetd (not reachable by default) on port 23/tcp by using hardcoded credentials on the web admin interface (https://target/fh). They are mainly used in South America and in Southeast Asia (from Shodan). Probability of exploitation activity in the next 30 days EPSS Score History. References https://nvd. Futhermore, due to the lack of firewall for IPv6 connectivity, all the internal services will be reachable over IPv6 (from the Internet). nist. Jan 12, 2021 · It is also possible to enable a CLI telnetd (not reachable by default) on port 23/tcp by using hardcoded credentials on the web admin interface (https://target/fh). By sending `ddd` then `tshell`, a telnetd will be started on port 26/tcp: $ echo GgpoZWxwCmxpc3QKd2hvCmRkZAp0c2hlbGwK | base64 -d | nc target 23 & CVE-2021-27165 is a security issue discovered in FiberHome HG6245D devices through RP2613. The telnet daemon on port 23/tcp can be abused with the gpon/gpon credentials. The product contains hard-coded credentials, such as a password or cryptographic key. gov/vuln/detail/CVE-2021-27177 Jan 14, 2021 · password from "Telnet server (Linux) - Hardcoded credentials). . These devices come with competitive pricing but are very powerful, with a lot of memory and storage. tpeax mvrxyi katsydog euzb qsfvh rvqz bta gahw wxey ozvk