Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Title Actiontec GT784WN Wireless N DSL Modem contains multiple vulnerabilities
Name VU#335192 First vendor Publication 2015-08-11
Vendor VU-CERT Last vendor Modification 2015-08-11
Severity (Vendor) N/A Revision M

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 8.3 Attack Range Adjacent network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Vulnerability Note VU#335192

Actiontec GT784WN Wireless N DSL Modem contains multiple vulnerabilities

Original Release date: 11 Aug 2015 | Last revised: 11 Aug 2015


Actiontec GT784WN Wireless N DSL Modem, versions NCS01-1.0.12 and earlier, contains multiple vulnerabilities.


CWE-259: Use of Hard-coded Password - CVE-2015-2904

Actiontec GT784WN Wireless N DSL Modem contains multiple hard-coded credentials that enable a user to log into the web administration interface with root privileges.

CWE-352: Cross-Site Request Forgery (CSRF) - CVE-2015-2905

Actiontec GT784WN Wireless N DSL Modem contains a global cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. Note that in combination with hard-coded credentials, an attacker can reliably establish an active session as part of an attack and therefore does not require a victim to be logged in.

The CVSS score below describes CVE-2015-2904.


A remote, unauthenticated attacker may be able to execute arbitrary script in the context of the end-user's browser session or perform actions as an authenticated user. A network-based attacker can take complete control of an affected device.


Apply an update

Actiontec has released NCS01-1.0.13 to address these vulnerabilities. Users are encouraged to update their firmware to the latest release.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
ActiontecAffected13 Jul 201510 Aug 2015
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)



  • http://www.actiontec.com/support/soft_files/GT784WN_NCS_HTTP-Upgrade_NCS01-1.0.13.img
  • http://cwe.mitre.org/data/definitions/259.html
  • http://cwe.mitre.org/data/definitions/352.html


These vulnerabilities were reported by Joel Land of the CERT/CC.

This document was written by Joel Land.

Other Information

  • CVE IDs:CVE-2015-2904CVE-2015-2905
  • Date Public:11 Aug 2015
  • Date First Published:11 Aug 2015
  • Date Last Updated:11 Aug 2015
  • Document Revision:17


If you have feedback, comments, or additional information about this vulnerability, please send us email.

Original Source

Url : http://www.kb.cert.org/vuls/id/335192

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-352 Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25)

CPE : Common Platform Enumeration

Os 1

Alert History

If you want to see full details history, please login or register.
Date Informations
2015-08-24 21:33:42
  • Multiple Updates
2015-08-24 05:29:23
  • Multiple Updates
2015-08-12 00:26:00
  • First insertion