• KZTech/JatonTec/Neotel JT3500V 4G LTE CPE 2.0.1 Hard-Coded Credentails

    From Sven@21:1/5 to All on Fri Mar 19 18:12:27 2021
    XPost: alt.hackers.malicious

    2021/03/19 16:44:59 GMT

    Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 utilizes hard-coded
    credentials within its Linux distribution image. These sets of credentials are never
    exposed to the end-user and cannot be changed through any normal operation of the router.

    https://packetstormsecurity.com/files/161883/ZSL-2021-5637.txt

    Source: Packet Storm Security

    -- Sven Exploits

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Big Bad Bob@21:1/5 to Sven on Sat Mar 20 03:14:31 2021
    XPost: alt.hackers.malicious

    On 2021-03-19 11:12, Sven wrote:
    2021/03/19 16:44:59 GMT

    Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 utilizes hard-coded
    credentials within its Linux distribution image. These sets of credentials are never
    exposed to the end-user and cannot be changed through any normal operation of the router.

    https://packetstormsecurity.com/files/161883/ZSL-2021-5637.txt

    Source: Packet Storm Security

    -- Sven Exploits


    wouldnt it be better to summarize all vulns for this particular device
    in a single post, rather than 10 separate ones?


    --
    (aka 'Bombastic Bob' in case you wondered)

    'Feeling with my fingers, and thinking with my brain' - me

    'your story is so touching, but it sounds just like a lie'
    "Straighten up and fly right"

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From gh0stanon@21:1/5 to Big Bad Bob on Sat Mar 20 12:19:45 2021
    ["Followup-To:" header set to alt.hackers.malicious.]
    On 2021-03-20, Big Bad Bob <BigBadBob-at-mrp3-dot-com@testing.local> wrote:
    On 2021-03-19 11:12, Sven wrote:
    2021/03/19 16:44:59 GMT

    Description: KZTech/JatonTec/Neotel JT3500V 4G LTE CPE version 2.0.1 utilizes hard-coded
    credentials within its Linux distribution image. These sets of credentials are never
    exposed to the end-user and cannot be changed through any normal operation of the router.

    https://packetstormsecurity.com/files/161883/ZSL-2021-5637.txt

    Source: Packet Storm Security

    -- Sven Exploits


    wouldnt it be better to summarize all vulns for this particular device
    in a single post, rather than 10 separate ones?


    seems to be a bot posting rss feeds line by line.

    --
    +++>> gh0stAnon <<+++
    cloakn3kcia4pnos.onion port 6697 ssl
    cloaknet@REMOVEriseup.net
    Twitter: @locogh0st

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Auric__@21:1/5 to All on Sun Mar 21 02:49:35 2021
    gh0stanon wrote:

    ["Followup-To:" header set to alt.hackers.malicious.]
    On 2021-03-20, Big Bad Bob <BigBadBob-at-mrp3-dot-com@testing.local>
    wrote:

    wouldnt it be better to summarize all vulns for this particular device
    in a single post, rather than 10 separate ones?

    seems to be a bot posting rss feeds line by line.

    I killfiled it. Quieted things down a bit.

    --
    In her spare time she destroys Tokyo.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From gh0stanon@21:1/5 to not.my.real@email.address on Sun Mar 21 03:24:13 2021
    On 2021-03-21, Auric__ <not.my.real@email.address> wrote:
    gh0stanon wrote:

    ["Followup-To:" header set to alt.hackers.malicious.]
    On 2021-03-20, Big Bad Bob <BigBadBob-at-mrp3-dot-com@testing.local>
    wrote:

    wouldnt it be better to summarize all vulns for this particular device
    in a single post, rather than 10 separate ones?

    seems to be a bot posting rss feeds line by line.

    I killfiled it. Quieted things down a bit.


    Not me, it is at least on topic.

    --
    +++>> gh0stAnon <<+++
    cloakn3kcia4pnos.onion port 6697 ssl
    cloaknet@REMOVEriseup.net
    Twitter: @locogh0st

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)