Security Flaw in Toshiba Home Gateway Models and Configuration Access
CVE-2018-16201

8.8HIGH

Key Information:

Summary

The Toshiba Home Gateway models HEM-GW16A and HEM-GW26A, running firmware version 1.2.9 and earlier, have been found to use hard-coded credentials for their administrative settings. This security flaw may enable an attacker on the same local network to gain unauthorized access to the administration panel, allowing them to alter device configurations or execute arbitrary operating system commands, which can pose significant risks to network security.

Affected Version(s)

Toshiba Home gateway HEM-GW16A and Toshiba Home gateway HEM-GW26A (Toshiba Home gateway HEM-GW16A 1.2.9 and earlier, Toshiba Home gateway HEM-GW26A 1.2.9 and earlier)

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.