Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-20219

EPSS 42.90% · P98

Public Exploits 1

Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-20219

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. After successful authentication, the device sends an authentication cookie to the end user such that they can access the devices web administration panel. This token is hard-coded to a string in the source code (/usr/share/www/check.lp file). By setting this cookie in a browser, an attacker is able to maintain access to every ENC-400 device without knowing the password, which results in authentication bypass. Even if a user changes the password on the device, this token is static and unchanged.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Teracue ENC-400 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Teracue ENC-400是德国Teracue公司的一款便携式多流编码器。 Teracue ENC-400中存在安全漏洞,该漏洞源于程序使用了硬编码身份验证令牌。攻击者可利用该漏洞绕过身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-20219

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-20219

登录查看更多情报信息。

Same Patch Batch · n/a · 2019-03-17 · 93 CVEs total

CVE-2018-19783Kentix MultiSensor-LAN 授权问题漏洞
CVE-2019-7385Raisecom Technology GPON-ONU HT803G-07 操作系统命令注入漏洞
CVE-2018-19917Microweber 跨站脚本漏洞
CVE-2019-5415serve 信息泄露漏洞
CVE-2019-7391ZyXEL VMG3312-B10B DSL-491HNU-B1B v2 modem 跨站请求伪造漏洞
CVE-2018-18798School Attendance Monitoring System SQL注入漏洞
CVE-2019-5416localhost-now npm package 安全漏洞
CVE-2018-19934SolarWinds Serv-U FTP Server跨站脚本漏洞
CVE-2019-5417serve npm package 安全漏洞
CVE-2018-18435KioWare Server 权限许可和访问控制问题漏洞
CVE-2019-8934QEMU 代码问题漏洞
CVE-2019-7384Raisecom Technology GPON-ONU HT803G-07 命令注入漏洞
CVE-2019-7383SYSTORME ISG-600C、ISG-600H和ISG-800W 命令注入漏洞
CVE-2018-17997LayerBB 跨站脚本漏洞
CVE-2018-13104Open-Xchange OX App Suite 跨站脚本漏洞
CVE-2018-19694HMS Industrial Networks Netbiter 安全漏洞
CVE-2018-17996LayerBB 跨站请求伪造漏洞
CVE-2018-13103Open-Xchange OX App Suite 安全漏洞
CVE-2019-7222Linux kernel 信息泄露漏洞
CVE-2018-19525SYSTORME ISG-600C、ISG-600H和ISG-800W 跨站请求伪造漏洞

Showing top 20 of 93 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2018-20219

No comments yet


Leave a comment