Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Metrics
Affected Vendors & Products
References
History
Tue, 18 Nov 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ubee
Ubee ubee Evw3226 |
|
| CPEs | cpe:2.3:a:ubee:ubee_evw3226:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ubee
Ubee ubee Evw3226 |
Sat, 15 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ubeeinteractive
Ubeeinteractive evw3226 |
|
| Vendors & Products |
Ubeeinteractive
Ubeeinteractive evw3226 |
Fri, 14 Nov 2025 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device. | |
| Title | Ubee EVW3226 Unauthenticated Backup File Disclosure | |
| Weaknesses | CWE-538 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-11-14T22:49:58.179Z
Updated: 2025-11-18T16:19:32.158Z
Reserved: 2025-11-14T21:18:32.204Z
Link: CVE-2016-15056
Updated: 2025-11-18T16:19:21.722Z
Status : Awaiting Analysis
Published: 2025-11-14T23:15:41.687
Modified: 2025-11-18T17:15:56.507
Link: CVE-2016-15056
No data.