Telus Actiontec WEB6000Q Serial Number Information Disclosure
Posted by deepcore on June 13, 2019 – 11:59 am
Telus Actiontec WEB6000Q with firmware 1.1.02.22 suffers from a serial number information disclosure vulnerability. The wireless extenders use DHCP Option 125 to include device details such as model number, manufacturer, and serial number. The WCB6000Q DHCP DISCOVER and REQUEST broadcasts include the device serial number in the DHCP option 125 (subopt 2) field. An attacker on the same Layer 2 network segment as the device, can see all these DHCP requests with a packet capture. Once he or she has this, the device’s admin web UI password can be reset using the web UI “forgot password” page to reset to a known value.
Post a reply
You must be logged in to post a comment.