CVE-2021-22667 – Advantech BB-ESWGP506-2SFP-T Use of Hard-coded Credentials Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2021-22667
BB-ESWGP506-2SFP-T versions 1.01.09 and prior is vulnerable due to the use of hard-coded credentials, which may allow an attacker to gain unauthorized access and permit the execution of arbitrary code on the BB-ESWGP506-2SFP-T (versions 1.01.01 and prior). BB-ESWGP506-2SFP-T versiones 1.01.09 y anteriores, es vulnerable debido al uso de credenciales embebidas, lo que puede permitir a un atacante conseguir acceso no autorizado y permitir una ejecución de código arbitraria en BB-ESWGP506-2SFP-T (versiones 1.01.01 y anteriores) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Advantech BB-ESWGP506-2SFP-T industrial switches. Authentication is not required to exploit this vulnerability. The specific flaw exists within the telnet service, which listens on TCP port 23 by default. The service contains a hard-coded password for the administrator user account. An attacker can leverage this vulnerability to execute code in the context of the administrator user. • https://us-cert.cisa.gov/ics/advisories/icsa-21-054-02 https://www.zerodayinitiative.com/advisories/ZDI-21-593 • CWE-798: Use of Hard-coded Credentials •