We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
An OpenSSH daemon listens on TCP port 22. There is a hard-coded entry in the "/etc/shadow" file in the firmware image for the "root" user. However, in the default SSH configuration the "PermitRootLogin" is disabled, preventing the root user from logging in via SSH. This configuration can be bypassed/changed by an attacker through multiple paths though.
Reserved 2025-05-20 | Published 2025-05-21 | Updated 2025-05-30 | Assigner SEC-VLabStefan Viehböck | SEC Consult Vulnerability Lab
r.sec-consult.com/echarge
Support options