Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
History

Tue, 18 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 18 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Ubee
Ubee ubee Evw3226
CPEs cpe:2.3:a:ubee:ubee_evw3226:*:*:*:*:*:*:*:*
Vendors & Products Ubee
Ubee ubee Evw3226

Sat, 15 Nov 2025 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Ubeeinteractive
Ubeeinteractive evw3226
Vendors & Products Ubeeinteractive
Ubeeinteractive evw3226

Fri, 14 Nov 2025 23:00:00 +0000

Type Values Removed Values Added
Description Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Title Ubee EVW3226 Unauthenticated Backup File Disclosure
Weaknesses CWE-538
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-11-14T22:49:58.179Z

Updated: 2025-11-18T16:19:32.158Z

Reserved: 2025-11-14T21:18:32.204Z

Link: CVE-2016-15056

cve-icon Vulnrichment

Updated: 2025-11-18T16:19:21.722Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-14T23:15:41.687

Modified: 2025-11-18T17:15:56.507

Link: CVE-2016-15056

cve-icon Redhat

No data.