Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-1540

4 documents4 sources
Severity
5.0MEDIUM
EPSS
5.1%
top 10.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 31
Latest updateApr 29

Description

ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file.

CVSS vector

AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages2 packages

NVDzyxel/prestige5 versions+4
NVDzyxel/zynos3.40, is.3, is.5+2

🔴Vulnerability Details

2
GHSA
GHSA-v4rc-26p2-jm4g: ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to acce2022-04-29
CVEList
CVE-2004-1540: ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to acce2005-02-19

💥Exploits & PoCs

1
Exploit-DB
ZYXEL 3 Prestige Router - HTTP Remote Administration Configuration Reset2004-11-22
CVE-2004-1540 (MEDIUM CVSS 5) | ZyXEL Prestige 623 | cvebase.io