VAR-200412-0994
Vulnerability from variot - Updated: 2025-04-03 22:36ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file. ZyXEL Prestige router series is reported prone to an access validation vulnerability. A remote attacker may exploit this vulnerability to reset the configuration of the router
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200412-0994",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "zynos",
"scope": "eq",
"trust": 1.9,
"vendor": "zyxel",
"version": "3.40"
},
{
"model": "prestige",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "650hw_31"
},
{
"model": "prestige",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "650hw"
},
{
"model": "zynos",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "is.3"
},
{
"model": "prestige",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "650r"
},
{
"model": "prestige",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "645r_a1"
},
{
"model": "prestige",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "650h"
},
{
"model": "zynos",
"scope": "eq",
"trust": 1.6,
"vendor": "zyxel",
"version": "is.5"
},
{
"model": "zynos v3.40",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "zynos is.5",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "zynos is.3",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "prestige 650r",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "prestige 650hw-31",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "prestige 650hw",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "prestige 650h",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "prestige 645r-a1",
"scope": null,
"trust": 0.3,
"vendor": "zyxel",
"version": null
},
{
"model": "prestige 782r",
"scope": "ne",
"trust": 0.3,
"vendor": "zyxel",
"version": null
}
],
"sources": [
{
"db": "BID",
"id": "11723"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Francisco Jos?Canela\u203b darkydelphi@gmail.com",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
}
],
"trust": 0.6
},
"cve": "CVE-2004-1540",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CVE-2004-1540",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.0,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2004-1540",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-200412-1130",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ZyXEL Prestige 623, 650, and 652 HW Routers, and possibly other versions, with HTTP Remote Administration enabled, does not require a password to access rpFWUpload.html, which allows remote attackers to reset the router configuration file. ZyXEL Prestige router series is reported prone to an access validation vulnerability. \nA remote attacker may exploit this vulnerability to reset the configuration of the router",
"sources": [
{
"db": "NVD",
"id": "CVE-2004-1540"
},
{
"db": "BID",
"id": "11723"
}
],
"trust": 1.17
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "11723",
"trust": 1.9
},
{
"db": "SECUNIA",
"id": "13278",
"trust": 1.6
},
{
"db": "SECTRACK",
"id": "1012298",
"trust": 1.6
},
{
"db": "NVD",
"id": "CVE-2004-1540",
"trust": 1.6
},
{
"db": "OSVDB",
"id": "12108",
"trust": 1.6
},
{
"db": "XF",
"id": "18202",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20041124 RE: ROUTER ZYXEL PRESTIGE 650 HW HTTP REMOTE ADMIN.",
"trust": 0.6
},
{
"db": "BUGTRAQ",
"id": "20041121 ROUTER ZYXEL PRESTIGE 650 HW HTTP REMOTE ADMIN.",
"trust": 0.6
},
{
"db": "NSFOCUS",
"id": "7147",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200412-1130",
"trust": 0.6
}
],
"sources": [
{
"db": "BID",
"id": "11723"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"id": "VAR-200412-0994",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.41666666
},
"last_update_date": "2025-04-03T22:36:18.927000Z",
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.6,
"url": "http://www.securityfocus.com/bid/11723"
},
{
"trust": 1.6,
"url": "http://securitytracker.com/id?1012298"
},
{
"trust": 1.6,
"url": "http://secunia.com/advisories/13278"
},
{
"trust": 1.6,
"url": "http://www.osvdb.org/12108"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=110135136811344\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=110116413414615\u0026w=2"
},
{
"trust": 1.0,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18202"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/18202"
},
{
"trust": 0.6,
"url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=110135136811344\u0026w=2"
},
{
"trust": 0.6,
"url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=110116413414615\u0026w=2"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/7147"
},
{
"trust": 0.3,
"url": "http://www.zyxel.com/"
},
{
"trust": 0.3,
"url": "/archive/1/382231"
},
{
"trust": 0.3,
"url": "/archive/1/381835"
}
],
"sources": [
{
"db": "BID",
"id": "11723"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "11723"
},
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-11-22T00:00:00",
"db": "BID",
"id": "11723"
},
{
"date": "2004-11-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"date": "2004-12-31T05:00:00",
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2004-11-22T00:00:00",
"db": "BID",
"id": "11723"
},
{
"date": "2005-10-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200412-1130"
},
{
"date": "2025-04-03T01:03:51.193000",
"db": "NVD",
"id": "CVE-2004-1540"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ZyXEL Prestige 650 HW Remote management vulnerability",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "access verification error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200412-1130"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…