High severityNVD Advisory· Published Nov 14, 2025· Updated Apr 15, 2026
CVE-2016-15056
CVE-2016-15056
Description
Ubee EVW3226 cable modem/routers firmware versions up to and including 1.0.20 store configuration backup files in the web root after they are generated for download. These backup files remain accessible without authentication until the next reboot. A remote attacker on the local network can request 'Configuration_file.cfg' directly to obtain the backup archive. Because backup files are not encrypted, they expose sensitive information including the plaintext admin password, allowing full compromise of the device.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- seclists.org/fulldisclosure/2016/Jul/66nvd
- web.archive.org/web/20160403014231/http://www.ubeeinteractive.com/products/cable/evw3226nvd
- web.archive.org/web/20160726145043/http://www.search-lab.hu/advisories/122-ubee-evw3226-modem-router-multiple-vulnerabilitiesnvd
- www.exploit-db.com/exploits/40156nvd
- www.vulncheck.com/advisories/ubee-evw3226-unauthenticated-backup-file-disclosurenvd
News mentions
0No linked articles in our index yet.