Telesquare SDT-CS3B1 and SDT-CW3B1 devices through 1.2.0 have a default factory account. Remote attackers can obtain access to the device via TELNET using a hardcoded account.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=27284 | Third Party Advisory | 
| https://www.fortiguard.com/zeroday/FG-VD-18-106 | Third Party Advisory | 
| https://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=27284 | Third Party Advisory | 
| https://www.fortiguard.com/zeroday/FG-VD-18-106 | Third Party Advisory | 
Configurations
                    History
                    21 Nov 2024, 03:45
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.boho.or.kr/data/secNoticeView.do?bulletin_writing_sequence=27284 - Third Party Advisory | |
| References | () https://www.fortiguard.com/zeroday/FG-VD-18-106 - Third Party Advisory | 
Information
                Published : 2018-06-21 15:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12526
Mitre link : CVE-2018-12526
CVE.ORG link : CVE-2018-12526
JSON object : View
Products Affected
                telesquare
- sdt-cs3b1_firmware
- sdt-cw3b1_firmware
- sdt-cs3b1
- sdt-cw3b1
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
