Skip to content
May 23, 2025
  • Linkedin
  • Twitter
  • Facebook
  • Youtube

Daily CyberSecurity

Primary Menu
  • Home
  • Cyber Security
  • Cybercriminals
  • Data Leak
  • Linux
  • Malware Attack
  • Open Source Tool
  • Technology
  • Vulnerability
  • Home
  • News
  • Vulnerability
  • Unpatched ABD gateways and routers are vulnerable to three high-risk vulnerabilities
  • Vulnerability

Unpatched ABD gateways and routers are vulnerable to three high-risk vulnerabilities

Ddos July 10, 2018 3 min read

The SEC Vulnerability Advisory Lab pointed out in a notice released last week that the Epicentro-based broadband gateways and routers manufactured by Advanced Digital Broadcast (ABD) are vulnerable to three security vulnerabilities, CVE-2018-13108. Effects of CVE-2018-13109 and CVE-2018-13110.

These three vulnerabilities are described as local root jailbreak vulnerabilities, privilege bypass vulnerabilities, and privilege escalation vulnerabilities. Their severity rated as “critical”. Successful exploitation allows attackers to gain access to vulnerable devices. Full control permission

Johannes Greil of the SEC Vulnerability Consulting Lab reported that by exploiting the local root jailbreak vulnerability CVE-2018-13108 on unpatched ABD gateways and routers, attackers can gain full control over vulnerable devices, enabling them to Modify settings, retrieve all stored user credentials, and launch an attack on the internal network side of the Internet provider (ISP).

Greil explained that a flaw in network file sharing caused the vulnerability. The Network File Sharing feature on ADB broadband devices can access via the network protocol Samba for USB devices, and an attacker can abuse the Samba daemon and access the USB port with the highest access rights, then export the network share with root privileges.

CVE-2018-13109 is essentially an authorization bypass vulnerability that an attacker can use to gain access to a device setting that the user is denied access to. It’s worth noting that this exploit can also remotely access by manipulating settings, allowing the telnet server to access remote access when the ISP previously disabled it remotely. However, this attack scenario was confirmed to require some user account login information to be implemented.

CVE-2018-13110 is a privilege elevation vulnerability implemented through Linux group operations that allow an attacker to access the device’s command line interface (CLI) even if the ISP has previously disabled the CLI. Depending on the capabilities provided by the CLI, it is possible for an attacker to gain access to the entire configuration and to escalate permissions to the highest level of access by manipulating the settings of the web GUI.

According to the announcement of the SEC Vulnerability Consulting Laboratory, the product types affected by the vulnerability include ADB P.RG AV4202N, ADB DV 2210, ADB VV 5522 and ADB VV 2220. From the ADB website, the affected products may consist of the EVDSL/G.Fast/Fiber Gateway Dual-band WirelessAC1600 ST6840 and the GPON Gateway Dual-band Wireless AC1600 VG4820 based on the Epicentro platform.

According to relevant information, ADB produces routers and modems for more than 20 broadband and communications companies worldwide, and Cox Communication and Charter Communications, the third largest Internet service providers in North America, appear to be their customers. Currently, Cox and Charter have not responded to how many users may be affected.

The three vulnerabilities first discovered in June 2016, and the patch for vulnerabilities launched in July 2017. After two years, the SEC Vulnerability Consulting Lab finally decided to disclose the details of the vulnerability last week publicly.

Source: seclists

Rate this post

Found this helpful?

If this article helped you, please share it with others who might benefit.

Tags: ABD gateways

Continue Reading

Previous: Ubuntu Launchpad bug allows user with physical access bypass the lock screen
Next: Chinese hackers attack Australian national universities, threatening national security

Search

💙 Support Us!
We need 50 contributors this month to keep this site running.
19 of 50 supporters this month
☕ Buy Me a Coffee PayPalDonate
Our Websites
  • Penetration Testing Tools
  • The Daily Information Technology
    • About SecurityOnline.info
    • Advertise on SecurityOnline.info
    • Contact

    When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works

    • Disclaimer
    • Privacy Policy
    • DMCA NOTICE
    • Linkedin
    • Twitter
    • Facebook
    • Youtube
    Copyright © All rights reserved.
    x