// For flags

CVE-2007-6702

FS4104-AW VDSL Device (Rooter) - GoAhead WebServer Disclosure

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

goform/QuickStart_c0 on the GoAhead Web Server on the FS4104-AW (aka rooter) VDSL device contains a password in the typepassword field, which allows remote attackers to obtain this password by reading the HTML source, a different vulnerability than CVE-2002-1603.

goform/QuickStart_c0 sobre GoAhead Web Server en el dispositivo VDSL FS4104-AW (también conocido como rooter), permite la lectura del password del campo typepassword a través del código HTML. Vulnerabilidad distinta a CVE-2002-1603.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-03-04 CVE Reserved
  • 2008-03-04 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2024-11-29 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Goahead Software
Search vendor "Goahead Software"
Fs4104-aw Device
Search vendor "Goahead Software" for product "Fs4104-aw Device"
*-
Affected
Goahead Software
Search vendor "Goahead Software"
Goahead Webserver
Search vendor "Goahead Software" for product "Goahead Webserver"
*-
Affected