Vulnerabilities
Vulnerable Software
Actiontec:  >> Web6000q  Security Vulnerabilities
On Telus Actiontec WEB6000Q v1.1.02.22 devices, an attacker can login with root level access with the user "root" and password "admin" by using the enabled onboard UART headers.
CVSS Score
9.8
EPSS Score
0.012
Published
2019-06-28
The Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 allows login with root level access with the user "root" and an empty password by using the enabled onboard UART headers.
CVSS Score
9.8
EPSS Score
0.025
Published
2019-06-27
An issue was discovered in the Quantenna WiFi Controller on Telus Actiontec WEB6000Q v1.1.02.22 devices. An attacker can statically set his/her IP to anything on the 169.254.1.0/24 subnet, and obtain root access by connecting to 169.254.1.2 port 23 with telnet/netcat.
CVSS Score
8.8
EPSS Score
0.029
Published
2019-06-27


Contact Us

Shodan ® - All rights reserved