Vulnerability Note VU#870744
ZyXEL NBG-418N, PMG5318-B20A and P-660HW-T1 routers contain multiple vulnerabilities
Original Release date: 13 Oct 2015 | Last revised: 29 Oct 2015
Several models of ZyXEL routers are vulnerable to multiple issues, including weak default passwords, command injections due to improper input validation, and cross-site scripting.
CWE-255: Credentials Management – CVE-2015-6016
According to the reporter, the following models contain the weak default password of "1234" for the admin account:
the ZyXEL P-660HW-T1 v2 with ZyNOS firmware version: V3.40(AXH.0) (dated 3/30/2007)
the ZyXEL PMG5318-B20A, firmware version V100AANC0b5
the ZyXEL NBG-418N
Many more models have been reported to share this same password.
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) – CVE-2015-6017
According to the reporter, a reflected cross site scripting vulnerability exists in the LoginPassword and hiddenPassword parameters of the /Forms/rpAuth_1 page on the ZyXEL P-660HW-T1 v2 with ZyNOS firmware version: V3.40(AXH.0) (dated 3/30/2007).
CWE-20: Improper Input Validation – CVE-2015-6018
According to the reporter, the diagnostic ping function’s PingIPAddr parameter in the ZyXEL PMG5318-B20A, firmware version V100AANC0b5, does not properly validate user input. An attacker may be able to execute arbitrary commands as root.
CWE-613: Insufficient Session Expiration – CVE-2015-6019
According to the reporter, the ZyXEL PMG5318-B20A, firmware version V100AANC0b5 does not properly expire the session when a user logs out of the management portal. The reporter has confirmed the session remains active for at least 1 hour after log off. An attacker may be able to utilize session information to gain access to the device even after the user has logged off.
CWE-285: Improper Authorization – CVE-2015-6020
According to the reporter, the regular user account on the ZyXEL PMG5318-B20A, firmware version V100AANC0b5 has full administrative access, rather than restricted access.
A remote unauthenticated attacker may be able to modify system configuration.
Apply updates and other changes
ZyXEL has previously addressed some issues, and will address the remaining issues in October 2015.
ZyXEL has provided the following summary of responses to these issues:
ZyXEL has also provided the following responses:
"ZyXEL suggests users of all products change the default password upon initial log-in. This is critical to protecting your network by keeping any unauthorized users from gaining access via the default password. ZyXEL has included reminders for this practice on a majority of products. Changing the default password upon initial log-in is mandatory for the ZyXEL USG/ZyWALL, UAG, and LTE Series."
"Model P660HW-T1 v2 (ZyNOS v3.40) was designated "end-of-life" on May 14, 2010. ZyXEL assigns a product an "end-of-life" status when there is a clear indication that the market has transitioned to its replacement. This replacement generally offers advanced technology and/or better economics.
ZyXEL recommends users replace P660HW-T1 v2 with newer generations of DSL CPEs that better suit the network environment today. Or alternatively, as a good general security practice, ZyXEL suggests that users avoid visiting untrusted sites or clicking on unsolicited links. It is also recommended that users keep their browser, computer operating system, and security software current with the latest patches and updates."
"This issue was patched via a firmware update in December 2014 (version v1.00(AANC.2)C0), which included feature enhancements, as well as bug and security fixes. ZyXEL recommends that users go to the support site to obtain the latest update."
For CVE-2015-6019 and CVE-2015-6020:
ZyXEL has released firmware version V1.00(AANC.3)b1 to address these issues in PMG5318-20A.
Vendor Information (Learn More)
VendorStatusDate NotifiedDate UpdatedZyXELAffected25 Aug 201513 Oct 2015If you are a vendor and your product is affected, let
CVSS Metrics (Learn More)
Thanks to Joel Land for reporting the vulnerability in the NBG-418N. Thanks to Karn Ganeshen for reporting the remaining vulnerabilities to us.
This document was written by Garret Wassermann.
13 Oct 2015
Date First Published:
13 Oct 2015
Date Last Updated:
29 Oct 2015
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email.