Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2018-9248 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: FiberHome VDSL2 Modem HG 150-UB has a critical auth bypass flaw. πŸ“‰ **Consequences**: Attackers can bypass login screens entirely using a specific Cookie header. Total loss of device integrity.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper Access Control. 🧠 **Flaw**: The device fails to validate session tokens properly. It accepts a hardcoded/fake cookie (`Name=0admin`) as valid authentication. No CWE ID provided in data.

Q3Who is affected? (Versions/Components)

🏠 **Affected**: FiberHome VDSL2 Modem HG 150-UB. 🏭 **Vendor**: FiberHome (China). ⚠️ **Scope**: Specific hardware model only. No other versions mentioned.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Privileges**: Full Administrative Access. πŸ•΅οΈ **Data**: Complete control over the modem. Hackers can reconfigure network settings, intercept traffic, or use the device as a pivot point.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: LOW. πŸšͺ **Auth**: None required. πŸ“ **Config**: Simple HTTP request modification. Just add `Cookie: Name=0admin` to the request header. Extremely easy to execute.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exp**: YES. πŸ“‚ **Source**: Exploit-DB #44413. 🌐 **Status**: Active PoC available on GitHub (gist). Wild exploitation is highly likely given the simplicity.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Send HTTP request to the modem's admin interface. πŸ§ͺ **Test**: Inject `Cookie: Name=0admin`. βœ… **Result**: If you get a 200 OK or access the dashboard without logging in, you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

πŸ“… **Published**: 2018-04-04. πŸ› οΈ **Patch**: Data does not list a specific vendor patch link. ⚠️ **Risk**: Since it's from 2018, official support may be discontinued. Check vendor archives for firmware updates.

Q9What if no patch? (Workaround)

🚧 **Workaround**: 1. Change default admin password immediately. 2. Disable remote management if possible. 3. Place modem behind a firewall/WAF that filters suspicious Cookie headers. 4. Isolate the device on a VLAN.

Q10Is it urgent? (Priority Suggestion)

πŸ”΄ **Priority**: CRITICAL. πŸš€ **Urgency**: HIGH. The exploit is trivial (1-line header change) and grants full admin rights. Immediate remediation or isolation is required for any deployed units.