Verizon LVSKIHP 5G outside devices through 2022-02-15...
High severity
Unreviewed
Published
Apr 4, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Apr 3, 2022
Published to the GitHub Advisory Database
Apr 4, 2022
Last updated
Jan 27, 2023
Verizon LVSKIHP 5G outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
References