{ "schema_version": "1.4.0", "id": "GHSA-qwfg-8h9x-x782", "modified": "2022-05-13T01:10:22Z", "published": "2022-05-13T01:10:22Z", "aliases": [ "CVE-2016-10307" ], "details": "Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10307" }, { "type": "WEB", "url": "http://blog.iancaling.com/post/153011925478" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/97242" } ], "database_specific": { "cwe_ids": [ "CWE-798" ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-03-30T07:59:00Z" } }