A vulnerability in specific versions of Zyxel NBG6818, NBG7815, WSQ20, WSQ50, WSQ60, and WSR30 firmware with pre-configured password management could allow an attacker to obtain root access of the device, if the local attacker dismantles the device and uses a USB-to-UART cable to connect the device, or if the remote assistance feature had been enabled by an authenticated user.
Threat-Mapped Scoring
Score: 3.25
Priority: P2 - Serious (High)
S1 – Steal Customer Account Information
S9 – Sabotage of System/App (+0.25 bonus)
EPSS
Score: 0.00036Percentile:
0.08779
CVSS Scoring
CVSS v3.1 Score: 7.8
Severity: HIGH
Mapped CWE(s)
CWE-260
: Password in Configuration File
CWE-287
: Improper Authentication
All CAPEC(s)
CAPEC-114 : Authentication Abuse
CAPEC-115 : Authentication Bypass
CAPEC-151 : Identity Spoofing
CAPEC-194 : Fake the Source of Data
CAPEC-22 : Exploiting Trust in Client
CAPEC-57 : Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
CAPEC-593 : Session Hijacking
CAPEC-633 : Token Impersonation
CAPEC-650 : Upload a Web Shell to a Web Server
CAPEC-94 : Adversary in the Middle (AiTM)
CAPEC(s) with Mapped TTPs
CAPEC-114 : Authentication Abuse
Mapped TTPs:
T1548
: Abuse Elevation Control Mechanism
CAPEC-115 : Authentication Bypass
Mapped TTPs:
T1548
: Abuse Elevation Control Mechanism
CAPEC-57 : Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
Mapped TTPs:
CAPEC-593 : Session Hijacking
Mapped TTPs:
T1185
: Browser Session Hijacking
T1550.001
: Application Access Token
T1563
: Remote Service Session Hijacking
CAPEC-633 : Token Impersonation
Mapped TTPs:
T1134
: Access Token Manipulation
CAPEC-650 : Upload a Web Shell to a Web Server
Mapped TTPs:
CAPEC-94 : Adversary in the Middle (AiTM)
Mapped TTPs:
T1557
: Adversary-in-the-Middle
Mapped ATT&CK TTPs
T1548
: Abuse Elevation Control Mechanism
Kill Chain: privilege-escalation
T1548
: Abuse Elevation Control Mechanism
Kill Chain: privilege-escalation
T1040
: Network Sniffing
Kill Chain: credential-access
T1185
: Browser Session Hijacking
Kill Chain: collection
T1550.001
: Application Access Token
Kill Chain: defense-evasion
T1563
: Remote Service Session Hijacking
Kill Chain: lateral-movement
T1134
: Access Token Manipulation
Kill Chain: defense-evasion
T1505.003
: Web Shell
Kill Chain: persistence
T1557
: Adversary-in-the-Middle
Kill Chain: credential-access
Malware
APTs Threat Group Associations
Campaigns
Operation Wocao
APT41 DUST
ArcaneDoor
SolarWinds Compromise
Operation CuckooBees
2015 Ukraine Electric Power Attack
Versa Director Zero Day Exploitation
Leviathan Australian Intrusions
C0032
HomeLand Justice
C0017
Cutting Edge
2022 Ukraine Electric Power Attack
FrostyGoop Incident
Affected Products
cpe:2.3:o:zyxel:nbg6818_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:nbg7815_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:wsq20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:wsq50_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:wsq60_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:zyxel:wsr30_firmware:*:*:*:*:*:*:*:*
← Back to Home
BrownCoat Threat Intelligence Platform | 2025 Steve Gray — You Can’t Take the Sky from Me