This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: FiberHome VDSL2 Modem HG 150-UB has a critical auth bypass flaw. π **Consequences**: Attackers can bypass login screens entirely using a specific Cookie header. Total loss of device integrity.
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: Improper Access Control. π§ **Flaw**: The device fails to validate session tokens properly. It accepts a hardcoded/fake cookie (`Name=0admin`) as valid authentication. No CWE ID provided in data.
Q3Who is affected? (Versions/Components)
π **Affected**: FiberHome VDSL2 Modem HG 150-UB. π **Vendor**: FiberHome (China). β οΈ **Scope**: Specific hardware model only. No other versions mentioned.
Q4What can hackers do? (Privileges/Data)
π **Privileges**: Full Administrative Access. π΅οΈ **Data**: Complete control over the modem. Hackers can reconfigure network settings, intercept traffic, or use the device as a pivot point.β¦
π **Threshold**: LOW. πͺ **Auth**: None required. π **Config**: Simple HTTP request modification. Just add `Cookie: Name=0admin` to the request header. Extremely easy to execute.
Q6Is there a public Exp? (PoC/Wild Exploitation)
π₯ **Public Exp**: YES. π **Source**: Exploit-DB #44413. π **Status**: Active PoC available on GitHub (gist). Wild exploitation is highly likely given the simplicity.
Q7How to self-check? (Features/Scanning)
π **Check**: Send HTTP request to the modem's admin interface. π§ͺ **Test**: Inject `Cookie: Name=0admin`. β **Result**: If you get a 200 OK or access the dashboard without logging in, you are vulnerable.β¦
π **Published**: 2018-04-04. π οΈ **Patch**: Data does not list a specific vendor patch link. β οΈ **Risk**: Since it's from 2018, official support may be discontinued. Check vendor archives for firmware updates.
Q9What if no patch? (Workaround)
π§ **Workaround**: 1. Change default admin password immediately. 2. Disable remote management if possible. 3. Place modem behind a firewall/WAF that filters suspicious Cookie headers. 4. Isolate the device on a VLAN.
Q10Is it urgent? (Priority Suggestion)
π΄ **Priority**: CRITICAL. π **Urgency**: HIGH. The exploit is trivial (1-line header change) and grants full admin rights. Immediate remediation or isolation is required for any deployed units.