Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2008-1524

EPSS 0.57% · P69
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2008-1524

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The SNMP service on ZyXEL Prestige routers, including P-660 and P-661 models with firmware 3.40(AGD.2) through 3.40(AHQ.3), has "public" as its default community for both (1) read and (2) write operations, which allows remote attackers to perform administrative actions via SNMP, as demonstrated by reading the Dynamic DNS service password or inserting an XSS sequence into the system.sysName.0 variable, which is displayed on the System Status page.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
ZyXEL Prestige路由器SNMP服务器的P-660和P-661模式 system.sysName.0变量跨站脚本攻击漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
ZyXEL Prestige路由器(包括带有固件3.40(AGD.2)到3.40(AHQ.3)的P-660和P-661模式)上的SNMP服务器, 包括带有固件3.40(AGD.2)到3.40(AHQ.3)的P-660和P-661模式,把"public"作为读写操作的默认的共同区域,这使得远程攻击者可以借助SNMP,进行管理员操作。比如,读取动态的DNS服务器密码或注入跨站脚本攻击序列到system.sysName.0变量,这可以显示在系统状态页上。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2008-1524

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2008-1524

登录查看更多情报信息。

Same Patch Batch · n/a · 2008-03-26 · 13 CVEs total

CVE-2003-1553Haakon Nilsen Simple Internet Publishing System 信息泄露漏洞
CVE-2003-1554ScozBook 跨站脚本漏洞
CVE-2003-1555ScozBook 信息泄露漏洞
CVE-2008-1521ZyXEL Prestige路由器 管理员URIs权限许可和访问控制漏洞
CVE-2008-1522ZyXEL Prestige路由器P-660和P-661模式用户权限漏洞
CVE-2008-1523ZyXEL Prestige路由器信息动态的DNS泄露漏洞
CVE-2008-1525ZyXEL Prestige路由器 IP地址欺骗漏洞
CVE-2008-1526ZyXEL Prestige路由器 MD5加密问题漏洞
CVE-2008-1527ZyXEL Prestige路由器P-660,P-661和P-662模式HTTP验证安全权限漏洞
CVE-2008-1528ZyXEL Prestige路由器直接的HTTP请求信息泄露漏洞
CVE-2008-1529ZyXEL Prestige路由器帐户暴力破解漏洞
CVE-2008-1514Linux Kernel s390 ptrace 'ptrace.c' 拒绝服务漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2008-1524

No comments yet


Leave a comment