Home

Description

ZBL EPON ONU Broadband Router V100R001 contains a privilege escalation vulnerability that allows limited administrative users to elevate access by sending requests to configuration endpoints. Attackers can exploit the vulnerability by accessing the configuration backup or password page to disclose the super user password and gain additional privileged functionalities.

PUBLISHED Reserved 2025-12-23 | Published 2025-12-31 | Updated 2026-01-02 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Insufficiently Protected Credentials

Product status

1.0
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.exploit-db.com/exploits/49737 (ExploitDB-49737) exploit

www.zblchina.com (ZBL China Vendor Homepage) product

web.archive.org/...0211220094023/http://www.wd-thailand.com/ (Archived W&D Thailand Vendor Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2021-5647.php (Zero Science Lab Disclosure (ZSL-2021-5647)) third-party-advisory

www.vulncheck.com/...e-escalation-via-configuration-endpoint (VulnCheck Advisory: ZBL EPON ONU Broadband Router V100R001 Privilege Escalation via Configuration Endpoint) third-party-advisory

cve.org (CVE-2021-47741)

nvd.nist.gov (CVE-2021-47741)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.