ZyXEL PK5001Z devices have zyad5001 as the su password, which makes it easier for remote attackers to obtain root access if a non-root account password is known (or a non-root default account exists within an ISP's deployment of these devices).
                
            References
                    | Link | Resource | 
|---|---|
| https://forum.openwrt.org/viewtopic.php?id=62266 | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/43105/ | |
| https://forum.openwrt.org/viewtopic.php?id=62266 | Exploit Third Party Advisory | 
| https://www.exploit-db.com/exploits/43105/ | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 02:43
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://forum.openwrt.org/viewtopic.php?id=62266 - Exploit, Third Party Advisory | |
| References | () https://www.exploit-db.com/exploits/43105/ - | 
Information
                Published : 2017-07-25 18:29
Updated : 2025-04-20 01:37
NVD link : CVE-2016-10401
Mitre link : CVE-2016-10401
CVE.ORG link : CVE-2016-10401
JSON object : View
Products Affected
                zyxel
- pk5001z_firmware
- pk5001z
CWE
                
                    
                        
                        CWE-255
                        
            Credentials Management Errors
