Hybrid Networks Cable Broadband Access System 1.0 - Remote Configuration
Author: KSR[T]
type: remote
platform: hardware
port:
date_added: 1999-10-05
date_updated: 2012-07-02
verified: 1
codes: CVE-1999-0791;OSVDB-1100
tags:
aliases:
screenshot_url:
application_url:
raw file: 19538.txt
source: https://www.securityfocus.com/bid/695/info
Hybrid Network's cable modems are vulnerable to several different types of attack due to a lack of authentication for the remote administration/configuration system. The cable modems use a protocol called HSMP, which uses UDP as its transport layer protocol. This makes it trivial to spoof packets and possible for hackers to compromise cable-modem subscribers anonymously. The possible consequences of this problem being exploited are very serious and range from denial of service attacks to running arbitrary code on the modem.
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-1.tar.gz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-2.tar.gz
https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/19538-3.tar.gz