Use of hardcoded password (backdoor) in SDS 1202X-E - #VU16229
Published: December 4, 2018
SDS 1202X-E
Detailed vulnerability description
The vulnerability allows a remote attacker to gain full access to the affected system.
The vulnerability exists due to the password hashes are hardcoded and are difficult to change because the “shadow” file is stored on a cramfs (intentionally write-only) file system. A remote unauthenticated attacker can connect as root to the oscilloscope via LAN when Telnet service is listening on port 23.