CVE-2016-15056
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-14

Last updated on: 2025-11-18

Assigner: VulnCheck

Description
Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-14
Last Modified
2025-11-18
Generated
2026-05-06
AI Q&A
2025-11-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ubee evw3226 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-538 The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Ubee EVW3226 cable modem/routers with firmware versions up to 1.0.20. The device stores configuration backup files in the web root directory after they are generated for download. These backup files remain accessible without any authentication until the device is rebooted. A remote attacker on the local network can directly request the backup file named 'Configuration_file.cfg' and obtain it. Since these backup files are not encrypted, they expose sensitive information including the plaintext administrator password, which can lead to full compromise of the device.


How can this vulnerability impact me? :

An attacker on the local network can exploit this vulnerability to access the device's configuration backup file without authentication. This file contains sensitive information such as the plaintext administrator password. With this information, the attacker can fully compromise the device, potentially gaining control over the modem/router and any network traffic passing through it.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart