Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2020-35338 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Default credentials on Web UI! 🚨 πŸ’₯ **Consequences**: Unauthorized access to the admin panel. Attackers can take full control of the Wireless Multiplex Terminal.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **Trust Management Issue** (CWE not specified in data). πŸ” **Flaw**: The device ships with a hardcoded default account. Password is static: `pokon`. No complexity or randomization enforced.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: Mobile Viewpoint Wireless Multiplex Terminal. πŸ“‰ **Versions**: Playout Server **<= 20.2.8**. (Based on PoC description). Vendor: Mobile Viewpoint (Netherlands).

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: Full **Administrative Access** via Web Interface. πŸ“‚ **Data**: Complete control over device configuration. Potential to disrupt broadband bundling and video streaming services.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ“‰ **Threshold**: **LOW**. πŸ”‘ **Auth**: Requires **NO** password change. Default `pokon` works out-of-the-box. βš™οΈ **Config**: Needs only network access to the Web Admin Interface. No complex exploitation steps.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp?**: **YES**. πŸ“œ **PoC**: Available via **ProjectDiscovery Nuclei Templates** (CVE-2020-35338.yaml). Automated scanning tools can detect this instantly.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Use **Nuclei** or similar scanners. πŸ“ **Method**: Check for the default `pokon` credential login success on the web admin path.…

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Official Fix**: **YES**. πŸ“… **Published**: 2020-12-14. Vendor (Mobile Viewpoint) released guidance. Update to version **> 20.2.8** or apply vendor patch to remove default creds.

Q9What if no patch? (Workaround)

🚧 **No Patch? Workaround**: 1️⃣ **Change Password**: Immediately set a strong password for the admin account. 2️⃣ **Network Segmentation**: Block external access to the Web Admin Interface (Firewall rules). 3️⃣ **Disabl…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. 🎯 **Priority**: **P1**. Default passwords are an instant ticket for attackers. Automated scanners (Nuclei) are already hunting this. Patch or mitigate **IMMEDIATELY**.