Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.
References
Link | Resource |
---|---|
https://github.com/JousterL/SecWriteups/blob/main/Verizon%20LVSKIHP%205G%20Modem/readme.md | Exploit Third Party Advisory |
https://www.reddit.com/r/verizon/comments/sstq4c/5g_home_internet_dropping_out/hx3ir0s/ | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-04-03T03:27:43
Updated: 2022-07-14T12:28:25
Reserved: 2022-04-03T00:00:00
Link: CVE-2022-28376
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-04-03T04:15:08.177
Modified: 2023-08-08T14:22:24.967
Link: CVE-2022-28376
JSON object: View
Redhat Information
No data.
CWE