Verizon 5G Home LVSKIHP CPE Admin Website Access Vulnerability

Verizon 5G Home LVSKIHP CPE Admin Website Access Vulnerability

CVE-2022-28376 · HIGH Severity

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Verizon 5G Home LVSKIHP outside devices through 2022-02-15 allow anyone (knowing the device's serial number) to access a CPE admin website, e.g., at the 10.0.0.1 IP address. The password (for the verizon username) is calculated by concatenating the serial number and the model (i.e., the LVSKIHP string), running the sha256sum program, and extracting the first seven characters concatenated with the last seven characters of that SHA-256 value.

Learn more about our Web App Pen Testing.