Vulnerability Details : CVE-2008-1524
The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page.
Vulnerability category: Cross site scripting (XSS)
Exploit prediction scoring system (EPSS) score for CVE-2008-1524
Probability of exploitation activity in the next 30 days: 0.64%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 76 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2008-1524
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-1524
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-1524
Products affected by CVE-2008-1524
- cpe:2.3:h:zyxel:zynos:3.40:agd.2:*:*:*:*:*:*
- cpe:2.3:h:zyxel:zynos:3.40:agl.3:*:*:*:*:*:*
- cpe:2.3:h:zyxel:zynos:3.40:ahq.0:*:*:*:*:*:*
- cpe:2.3:h:zyxel:zynos:3.40:ahq.3:*:*:*:*:*:*
- cpe:2.3:h:zyxel:zynos:3.40:ahz.0:*:*:*:*:*:*
- cpe:2.3:h:zyxel:zynos:3.40:atm.0:*:*:*:*:*:*
- cpe:2.3:h:zyxel:prestige_660:h-d1:*:*:*:*:*:*:*
- cpe:2.3:h:zyxel:prestige_660:h-d3:*:*:*:*:*:*:*
- cpe:2.3:h:zyxel:prestige_661:hw-d1:*:*:*:*:*:*:*