We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
The `/etc/passwd` and `/etc/shadow` files reveal hard-coded password hashes for the operating system "root" user. The credentials are shipped with the update files. There is no option for deleting or changing their passwords for an enduser. An attacker can use the credentials to log into the device. Authentication can be performed via SSH backdoor or likely via physical access (UART shell).
Reserved 2025-05-20 | Published 2025-05-21 | Updated 2025-05-21 | Assigner SEC-VLabCWE-798 Use of Hard-coded Credentials
Stefan Viehböck | SEC Consult Vulnerability Lab
r.sec-consult.com/echarge
Support options