Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
CVSS
No CVSS.
References
Configurations
No configuration.
History
18 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://seclists.org/fulldisclosure/2016/Jul/66 - | |
| References | () https://web.archive.org/web/20160726145043/http://www.search-lab.hu/advisories/122-ubee-evw3226-modem-router-multiple-vulnerabilities - | |
| References | () https://www.exploit-db.com/exploits/40156 - |
14 Nov 2025, 23:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-14 23:15
Updated : 2025-11-18 17:15
NVD link : CVE-2016-15056
Mitre link : CVE-2016-15056
CVE.ORG link : CVE-2016-15056
JSON object : View
Products Affected
No product.
CWE
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory
