All ADB broadband gateways / routers based on the Epicentro platform are affected by an authorization bypass vulnerability where attackers are able to access and manipulate settings within the web interface that are forbidden to end users (e.g., by the ISP). An attacker would be able to enable the TELNET server or other settings as well.
                
            References
                    | Link | Resource | 
|---|---|
| http://packetstormsecurity.com/files/148429/ADB-Authorization-Bypass.html | Third Party Advisory VDB Entry | 
| http://seclists.org/fulldisclosure/2018/Jul/18 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/archive/1/542119/100/0/threaded | Third Party Advisory VDB Entry | 
| https://www.exploit-db.com/exploits/44982/ | Third Party Advisory VDB Entry | 
| https://www.sec-consult.com/en/blog/advisories/authorization-bypass-in-all-adb-broadband-gateways-routers/ | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
            
            
 
  | 
    
Configuration 2 (hide)
| AND | 
            
            
 
  | 
    
Configuration 3 (hide)
| AND | 
            
            
 
  | 
    
Configuration 4 (hide)
| AND | 
            
            
 
  | 
    
History
                    No history.
Information
                Published : 2018-07-06 14:29
Updated : 2019-10-03 00:03
NVD link : CVE-2018-13109
Mitre link : CVE-2018-13109
CVE.ORG link : CVE-2018-13109
JSON object : View
Products Affected
                adbglobal
- vv2220
 - vv2220_firmware
 - prg_av4202n_firmware
 - dv2210
 - vv5522
 - vv5522_firmware
 - dv2210_firmware
 - prg_av4202n
 
CWE
                
                    
                        
                        CWE-863
                        
            Incorrect Authorization
