Description
Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Problem types
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
Product status
Any version
Timeline
| 2016-07-25: | ExploitDB-40156 is publicly disclosed. |
Credits
Gergely Eberhardt of Search-Lab.hu
References
www.exploit-db.com/exploits/40156
seclists.org/fulldisclosure/2016/Jul/66
web.archive.org/...226-modem-router-multiple-vulnerabilities
www.exploit-db.com/exploits/40156
seclists.org/fulldisclosure/2016/Jul/66
web.archive.org/...226-modem-router-multiple-vulnerabilities
web.archive.org/...beeinteractive.com/products/cable/evw3226
www.vulncheck.com/...-unauthenticated-backup-file-disclosure