Home

Description

IDC SFX2100 Satellite Receiver firmware ships with multiple daemon configuration files for routing components (e.g., zebra, bgpd, ospfd, and ripd) that are owned by root but world-readable. The configuration files (e.g., zebra.conf, bgpd.conf, ospfd.conf, ripd.conf) contain hardcoded or otherwise insecure plaintext passwords (including “enable”/privileged-mode credentials). A remote actor is able to abuse the reuse/hardcoded nature of these credentials to further access other systems in the network, gain a foothold on the satellite receiver or potentially locally privilege escalate.

PUBLISHED Reserved 2026-03-04 | Published 2026-03-05 | Updated 2026-03-05 | Assigner Gridware




HIGH: 8.6CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Problem types

CWE-522 Insufficiently Protected Credentials

CWE-798 Use of Hard-coded Credentials

Product status

Default status
affected

SFX2100
affected

Credits

Abdul Mhanni finder

References

www.abdulmhsblog.com/posts/sfx2100-vulns/ exploit

www.abdulmhsblog.com/posts/sfx2100-vulns/

cve.org (CVE-2026-29128)

nvd.nist.gov (CVE-2026-29128)

Download JSON