CVE-2016-15056

Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
CVSS

No CVSS.

Configurations

No configuration.

History

18 Nov 2025, 17:15

Type Values Removed Values Added
References () https://seclists.org/fulldisclosure/2016/Jul/66 - () https://seclists.org/fulldisclosure/2016/Jul/66 -
References () https://web.archive.org/web/20160726145043/http://www.search-lab.hu/advisories/122-ubee-evw3226-modem-router-multiple-vulnerabilities - () https://web.archive.org/web/20160726145043/http://www.search-lab.hu/advisories/122-ubee-evw3226-modem-router-multiple-vulnerabilities -
References () https://www.exploit-db.com/exploits/40156 - () https://www.exploit-db.com/exploits/40156 -

14 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-14 23:15

Updated : 2025-11-18 17:15


NVD link : CVE-2016-15056

Mitre link : CVE-2016-15056

CVE.ORG link : CVE-2016-15056


JSON object : View

Products Affected

No product.

CWE
CWE-538

Insertion of Sensitive Information into Externally-Accessible File or Directory