The Relish (Verve Connect) VH510 device with firmware before 1.0.1.6L0516 contains undocumented default admin credentials for the web management interface. A remote attacker could exploit this vulnerability to login and execute commands on the device, as well as upgrade the firmware image to a malicious version.
                
            References
                    | Link | Resource | 
|---|---|
| https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ | Third Party Advisory | 
| https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf | Exploit Third Party Advisory | 
| https://6point6.co.uk/insights/security-advisory-relish-4g-hub-vh510/ | Third Party Advisory | 
| https://6point6.co.uk/wp-content/uploads/2020/10/Relish-4G-VH510-Hub-Full-Disclosure-v1.3.pdf | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    No history.
Information
                Published : 2020-11-04 20:15
Updated : 2024-11-21 05:21
NVD link : CVE-2020-27689
Mitre link : CVE-2020-27689
CVE.ORG link : CVE-2020-27689
JSON object : View
Products Affected
                imomobile
- verve_connect_vh510_firmware
- verve_connect_vh510
CWE
                
                    
                        
                        CWE-798
                        
            Use of Hard-coded Credentials
