Description
ZyXEL ZyWALL 1050 has a hard-coded password for the Quagga and Zebra processes that is not changed when it is set by a user, which allows remote attackers to gain privileges.
Exploits
52892008-03-21remoteHardware
ZYXEL ZyWALL Quagga/Zebra - 'Default Password' Remote Code Execution
By Pranav Joshi
References
cve@mitre.org
http://secunia.com/advisories/29237cve@mitre.org
http://www.securityfocus.com/bid/28184cve@mitre.org
https://www.exploit-db.com/exploits/5289af854a3a-2127-422b-91ae-364da2661108
http://packetstormsecurity.org/0803-exploits/ZyWALL.pdfaf854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29237af854a3a-2127-422b-91ae-364da2661108
http://www.secumania.org/exploits/remote/zyxel-zywall-quagga_zebra-%28default-pass%29-remote-root-vulnerability-2008032143791/af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28184af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0990/referencesaf854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41424af854a3a-2127-422b-91ae-364da2661108
https://www.exploit-db.com/exploits/5289