Critical severity9.8NVD Advisory· Published Mar 30, 2017· Updated May 13, 2026
CVE-2016-10307
CVE-2016-10307
Description
Trango ApexLynx 2.0, ApexOrion 2.0, GigaLynx 2.0, GigaOrion 2.0, and StrataLink 3.0 devices have a built-in, hidden root account, with a default password for which the MD5 hash value is public (but the cleartext value is perhaps not yet public). This account is accessible via SSH and/or TELNET, and grants access to the underlying embedded UNIX OS on the device, allowing full control over it.
Affected products
5- cpe:2.3:o:gotrango:giga_lynx_firmware:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:gotrango:giga_orion_firmware:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:gotrango:apex_lynx_firmware:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:gotrango:apex_orion_firmware:2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- blog.iancaling.com/post/153011925478nvdExploitThird Party Advisory
- www.securityfocus.com/bid/97242nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.