CVE-2001-1135

N/A Unknown
Published: August 14, 2001 Modified: April 16, 2026
View on NVD

Description

ZyXEL Prestige 642R and 642R-I routers do not filter the routers' Telnet and FTP ports on the external WAN interface from inside access, allowing someone on an internal computer to reconfigure the router, if the password is known.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.securityfocus.com/archive/1/204439
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/archive/1/214971
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/3346
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/archive/1/203022
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/203592
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/204439
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/214971
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/3346
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/7146
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
73th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

zyxel