Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2018-15556
The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.025
EPSS Ranking
84.8%
CVSS Severity
CVSS v3 Score
9.8
CVSS v2 Score
10.0
References
http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html
http://seclists.org/fulldisclosure/2019/Jun/1
http://seclists.org/fulldisclosure/2019/Jun/1
http://packetstormsecurity.com/files/153262/Telus-Actiontec-WEB6000Q-Privilege-Escalation.html
http://seclists.org/fulldisclosure/2019/Jun/1
http://seclists.org/fulldisclosure/2019/Jun/1
Products affected by CVE-2018-15556
Actiontec
»
Web6000q
»
Version:
N/A
cpe:2.3:h:actiontec:web6000q:-
Actiontec
»
Web6000q Firmware
»
Version:
1.1.02.22
cpe:2.3:o:actiontec:web6000q_firmware:1.1.02.22
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved