CVE-2013-3542
high-risk
Published 2019-12-11
Grandstream GXV3501, GXV3504, GXV3601, GXV3601HD/LL, GXV3611HD/LL, GXV3615W/P, GXV3651FHD, GXV3662HD, GXV3615WP_HD, GXV3500, and possibly other camera models with firmware 1.0.4.11, have a hardcoded account "!#/" with the same password, which makes it easier for remote attackers to obtain access via a TELNET session.
Do I need to act?
~
3.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
10
CVSS 10.0/10
Critical
NETWORK
/ LOW complexity
Affected Products (13)
Gxv3501 Firmware
Gxv3504 Firmware
Gxv3601 Firmware
Gxv3601Hd Firmware
Gxv3601Ll Firmware
Gxv3611Hd Firmware
Gxv3611Ll Firmware
Gxv3615W Firmware
Gxv3615P Firmware
Gxv3651Fhd Firmware
Gxv3662Hd Firmware
Gxv3615Wp Hd Firmware
Gxv3500 Firmware
Affected Vendors
References (4)
Mailing List
http://seclists.org/fulldisclosure/2013/Jun/84
Mailing List
http://seclists.org/fulldisclosure/2013/Jun/84
57
/ 100
high-risk
Severity
33/34 · Critical
Exploitability
7/34 · Low
Exposure
17/34 · Moderate