CVE-2020-37092
Hardcoded Root Account in Netis E1+ Enables Full Admin Access
Publication date: 2026-02-03
Last updated on: 2026-02-03
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| netis | e1+ | 1.2.32533 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-798 | The product contains hard-coded credentials, such as a password or cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in Netis E1+ version 1.2.32533 is due to a hardcoded root account with predefined credentials. This means that attackers can access the device without authentication by using these fixed credentials.
Because the root account password is embedded and crackable, attackers can gain full administrative access to the network device.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to gain full administrative access to the affected device.
With administrative access, attackers can control the network device, potentially disrupting network operations, intercepting or manipulating network traffic, and compromising the security of the entire network.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know