A hard-coded weak password vulnerability has been discovered in all Magic-branded devices from Chinese network equipment manufacturer H3C. The vulnerability stems from the use of a hard-coded weak password for the root account in the /etc/shadow configuration or even the absence of any password at all. Some of these devices have the Telnet service enabled by default, or users can choose to enable the Telnet service in other device management interfaces (e.g. /debug.asp or /debug_telnet.asp). In addition, these devices have related interfaces called Virtual Servers, which can map the devices to the public network, posing the risk of remote attacks. Therefore, attackers can obtain the highest root privileges of the devices through the Telnet service using the weak password hardcoded in the firmware (or without a password), and remote attacks are possible.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.notion.so/25e8cd7f7805800a9a71c1193fb3cb43 |
|
History
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
H3c
H3c magic |
|
| Vendors & Products |
H3c
H3c magic |
Thu, 16 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-259 | |
| Metrics |
cvssV3_1
|
Thu, 16 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A hard-coded weak password vulnerability has been discovered in all Magic-branded devices from Chinese network equipment manufacturer H3C. The vulnerability stems from the use of a hard-coded weak password for the root account in the /etc/shadow configuration or even the absence of any password at all. Some of these devices have the Telnet service enabled by default, or users can choose to enable the Telnet service in other device management interfaces (e.g. /debug.asp or /debug_telnet.asp). In addition, these devices have related interfaces called Virtual Servers, which can map the devices to the public network, posing the risk of remote attacks. Therefore, attackers can obtain the highest root privileges of the devices through the Telnet service using the weak password hardcoded in the firmware (or without a password), and remote attacks are possible. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-10-16T00:00:00.000Z
Updated: 2025-10-16T19:32:27.409Z
Reserved: 2025-09-26T00:00:00.000Z
Link: CVE-2025-61330
Updated: 2025-10-16T19:32:22.909Z
Status : Awaiting Analysis
Published: 2025-10-16T18:15:37.313
Modified: 2025-10-21T19:31:50.020
Link: CVE-2025-61330
No data.